
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-978j-88f3-p5j3) affects the Shamir secret sharing implementation in the Rust programming language's 'shamir' crate for versions prior to 2.0.0. The issue was discovered on January 21, 2020, and involves an incorrect calculation of secret shares requirements. The vulnerability was officially published to the GitHub Advisory Database on June 17, 2022 (GitHub Advisory, RustSec Advisory).
The vulnerability stems from a programming error in the SecretData::withsecret implementation where the threshold value is incorrectly set. The bug occurs in the line 'let mut randcontainer = [0u8, threshold - 1]', which results in only three coefficients being generated for the polynomial, effectively creating an n=3 threshold system regardless of the user-specified threshold value (GitHub Issue).
This vulnerability reduces the security of the algorithm by forcing all sharded secrets to require exactly three shares for reconstruction, regardless of the threshold setting specified by the user. This means that even if a user configures the system for a higher threshold, the actual implementation will only require three shares, potentially compromising the intended security level (GitHub Advisory).
The vulnerability has been fixed in version 2.0.0 of the shamir crate by correctly configuring the threshold value. Users should upgrade to version 2.0.0 or later to ensure proper implementation of the specified threshold values (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."