Topic starter
Description
A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks.
References
https://github.com/sparkle-project/Sparkle/pull/2550
https://security.netapp.com/advisory/ntap-20250124-0008/
https://sparkle-project.org/documentation/security-and-reliability/
Posted : 21/02/2026 10:35 pm
