Insufficient Signature Validation Affecting libp2p-core package, versions >=0.3.1 <0.7.1>=0.8.0 <0.8.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.08% (38th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-LIBP2PCORE-174732
  • published17 May 2019
  • disclosed15 May 2019
  • creditUnknown

Introduced: 15 May 2019

CVE-2019-15545  (opens in a new tab)
CWE-347  (opens in a new tab)

How to fix?

Upgrade libp2p-core to version 0.7.1, 0.8.1 or higher.

Overview

libp2p-core is a rust implementation of libp2p networking stack.

Affected versions of this package are vulnerable to Insufficient Signature Validation. The verify function within ed25519.rs does not properly verify ed25519 signatures. When creating a Ed25519 secret key from a byte slice, combinators were not used resulting in any signature with a correct length being considered valid.

CVSS Scores

version 3.1