CVE-2020-15091

Source
https://cve.org/CVERecord?id=CVE-2020-15091
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-15091.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-15091
Aliases
Related
Published
2020-07-02T17:15:12.547Z
Modified
2026-02-23T08:21:56.864231Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

TenderMint from version 0.33.0 and before version 0.33.6 allows block proposers to include signatures for the wrong block. This may happen naturally if you start a network, have it run for some time and restart it (without changing chainID). A malicious block proposer (even with a minimal amount of stake) can use this vulnerability to completely halt the network. This issue is fixed in Tendermint 0.33.6 which checks all the signatures are for the block with 2/3+ majority before creating a commit.

References

Affected packages

Git / github.com/tendermint/tendermint

Affected ranges

Type
GIT
Repo
https://github.com/tendermint/tendermint
Events

Affected versions

v0.*
v0.33.0
v0.33.0-dev1
v0.33.0-dev2
v0.33.1
v0.33.1-dev0
v0.33.1-dev1
v0.33.1-dev2
v0.33.1-dev3
v0.33.2
v0.33.3
v0.33.4
v0.33.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-15091.json"