RUSTSEC-2019-0019

Source
https://rustsec.org/advisories/RUSTSEC-2019-0019
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2019-0019.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2019-0019
Aliases
Published
2019-08-25T12:00:00Z
Modified
2023-11-08T04:01:16.407154Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
HMAC-BLAKE2 algorithms compute incorrect results
Details

When used in conjunction with the Hash-based Message Authentication Code (HMAC), the BLAKE2b and BLAKE2s implementations in blake2 crate versions prior to v0.8.1 used an incorrect block size (32-bytes instead of 64-bytes for BLAKE2s, and 64-bytes instead of 128-bytes for BLAKE2b), causing them to miscompute the MacResult.

The v0.8.1 release of the blake2 crate uses the correct block sizes.

Note that this advisory only impacts usage of BLAKE2 with HMAC, and does not impact Digest functionality.

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / blake2

Package

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0
Fixed
0.8.1

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "os": [],
        "functions": [],
        "arch": []
    }
}

Database specific

{
    "cvss": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
    "informational": null,
    "categories": [
        "crypto-failure"
    ]
}