CVE-2020-15093
Summary
| CVE | CVE-2020-15093 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-07-09 19:15:00 UTC |
| Updated | 2021-10-26 19:58:00 UTC |
| Description | The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A fix is available in version 0.7.1. CVE-2020-6174 is assigned to the same vulnerability in the TUF reference implementation. |
Risk And Classification
Problem Types: CWE-347
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Merge pull request #974 from lukpueh/fix-signature-threshold · theupdateframework/tuf@2977188 · GitHub | MISC | github.com | Patch, Third Party Advisory |
| crates.io: Rust Package Registry | MISC | crates.io | Third Party Advisory |
| Improper uniqueness verification of signature threshold · Advisory · awslabs/tough · GitHub | CONFIRM | github.com | Third Party Advisory |
| Fix signature threshold by lukpueh · Pull Request #974 · theupdateframework/tuf · GitHub | MISC | github.com | Issue Tracking, Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 6140056 AWS Bottlerocket Security Update for tough (GHSA-5v32-qg59-h87c)