CVE-2022-47931: Collision of hash values in github.com/bnb-chain/tss-lib
9.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.08725%
CWE
Published
12/23/2022
Updated
5/20/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/bnb-chain/tss-lib | go | < 1.3.6-0.20230324145555-bb6fb30bd3eb | 1.3.6-0.20230324145555-bb6fb30bd3eb |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from insecure input concatenation in hash functions. The patch in commit 369ec50 modified both SHA512_256 and SHA512_256i to add binary-encoded length prefixes instead of string delimiters. The CVE description specifically mentions hash collisions related to these functions' input handling, and the GitHub advisory links to a fix that directly modifies these functions in hash.go. The medium.com analysis explicitly cites these functions as the source of CVE-2022-47931.