The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A fix is available in version 0.7.1. CVE-2020-6174 is assigned to the same vulnerability in the TUF reference implementation.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-1579 The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A fix is available in version 0.7.1. CVE-2020-6174 is assigned to the same vulnerability in the TUF reference implementation.
Github GHSA Github GHSA GHSA-5q2r-92f9-4m49 Improper verification of signature threshold in tough
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T13:08:21.663Z

Reserved: 2020-06-25T00:00:00

Link: CVE-2020-15093

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-07-09T19:15:11.413

Modified: 2024-11-21T05:04:47.553

Link: CVE-2020-15093

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses