The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A fix is available in version 0.7.1. CVE-2020-6174 is assigned to the same vulnerability in the TUF reference implementation.
The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Link | Tags |
---|---|
https://github.com/awslabs/tough/security/advisories/GHSA-5q2r-92f9-4m49 | third party advisory |
https://crates.io/crates/tough | third party advisory |
https://github.com/theupdateframework/tuf/pull/974 | issue tracking third party advisory patch |
https://github.com/theupdateframework/tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e | third party advisory patch |