The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A fix is available in version 0.7.1. CVE-2020-6174 is assigned to the same vulnerability in the TUF reference implementation.
References
Link | Resource |
---|---|
https://github.com/theupdateframework/tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e | Patch Third Party Advisory |
https://github.com/awslabs/tough/security/advisories/GHSA-5q2r-92f9-4m49 | Third Party Advisory |
https://crates.io/crates/tough | Third Party Advisory |
https://github.com/theupdateframework/tuf/pull/974 | Issue Tracking Patch Third Party Advisory |
Configurations
Information
Published : 2020-07-09 12:15
Updated : 2021-10-26 12:58
NVD link : CVE-2020-15093
Mitre link : CVE-2020-15093
JSON object : View
CWE
CWE-347
Improper Verification of Cryptographic Signature
Products Affected
amazon
- tough