GHSA-27w2-87xv-37c6HighCVSS 7.5
nimiq-keys: Unchecked Ed25519 signature length in TaggedPublicKey::verify causes remote node panic via DHT
🔗 CVE IDs covered (1)
📋 Description
### Impact
A malicious network peer can crash any Nimiq full node by publishing a crafted Kademlia DHT record containing a `TaggedSigned<ValidatorRecord, KeyPair>` with a signature field whose byte length is not exactly 64. When the victim node's DHT verifier calls `TaggedSigned::verify`, execution reaches `Ed25519Signature::from_bytes(sig).unwrap()` in the `TaggedPublicKey` implementation for `Ed25519PublicKey`. The `from_bytes` call fails because `ed25519_zebra::Signature::try_from` rejects slices not 64 bytes, and the `unwrap()` panics. The BLS `TaggedPublicKey` implementation correctly returns `false` on error; only the Ed25519 implementation panics.
### Patches
[The patch for this vulnerability](https://github.com/nimiq/core-rs-albatross/pull/3708) is formally released as part of [v1.4.0](https://github.com/nimiq/core-rs-albatross/releases/tag/v1.4.0).
### Workarounds
No known workarounds.
### Resources
See [PR](https://github.com/nimiq/core-rs-albatross/pull/3708).
🎯 Affected products1
- rust/nimiq-keys:<= 0.2.0
🔗 References (5)
- https://github.com/nimiq/core-rs-albatross/security/advisories/GHSA-27w2-87xv-37c6
- https://github.com/nimiq/core-rs-albatross/pull/3708
- https://github.com/nimiq/core-rs-albatross/commit/807ee8e99a7ccdc604d49971f292854bfa36754d
- https://github.com/nimiq/core-rs-albatross/releases/tag/v1.4.0
- https://github.com/advisories/GHSA-27w2-87xv-37c6