CVE-2020-15091

Source
https://cve.org/CVERecord?id=CVE-2020-15091
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-15091.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-15091
Aliases
Related
Published
2020-07-02T17:15:12.547Z
Modified
2026-04-11T21:48:33.504605Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

TenderMint from version 0.33.0 and before version 0.33.6 allows block proposers to include signatures for the wrong block. This may happen naturally if you start a network, have it run for some time and restart it (without changing chainID). A malicious block proposer (even with a minimal amount of stake) can use this vulnerability to completely halt the network. This issue is fixed in Tendermint 0.33.6 which checks all the signatures are for the block with 2/3+ majority before creating a commit.

References

Affected packages

Git / github.com/tendermint/tendermint

Affected ranges

Type
GIT
Repo
https://github.com/tendermint/tendermint
Events
Database specific
{
    "source": [
        "CPE_FIELD",
        "REFERENCES"
    ],
    "cpe": "cpe:2.3:a:tendermint:tendermint:*:*:*:*:*:*:*:*",
    "extracted_events": [
        {
            "introduced": "0.33.0"
        },
        {
            "fixed": "0.33.6"
        }
    ]
}

Affected versions

v0.*
v0.33.0
v0.33.1
v0.33.2
v0.33.3
v0.33.4
v0.33.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-15091.json"