Insufficient Signature Validation Affecting libp2p-core package, versions >=0.3.1 <0.7.1 >=0.8.0 <0.8.1


0.0
high

Snyk CVSS

    Attack Complexity Low
    Integrity High

    Threat Intelligence

    EPSS 0.08% (35th percentile)
Expand this section
NVD
7.5 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-RUST-LIBP2PCORE-174732
  • published 17 May 2019
  • disclosed 15 May 2019
  • credit Unknown

How to fix?

Upgrade libp2p-core to version 0.7.1, 0.8.1 or higher.

Overview

libp2p-core is a rust implementation of libp2p networking stack.

Affected versions of this package are vulnerable to Insufficient Signature Validation. The verify function within ed25519.rs does not properly verify ed25519 signatures. When creating a Ed25519 secret key from a byte slice, combinators were not used resulting in any signature with a correct length being considered valid.