{"id":"CVE-2020-15091","details":"TenderMint from version 0.33.0 and before version 0.33.6 allows block proposers to include signatures for the wrong block. This may happen naturally if you start a network, have it run for some time and restart it (**without changing chainID**). A malicious block proposer (even with a minimal amount of stake) can use this vulnerability to completely halt the network. This issue is fixed in Tendermint 0.33.6 which checks all the signatures are for the block with 2/3+ majority before creating a commit.","aliases":["GHSA-6jqj-f58p-mrw3","GO-2021-0090"],"modified":"2026-04-11T21:48:33.504605Z","published":"2020-07-02T17:15:12.547Z","related":["GHSA-6jqj-f58p-mrw3"],"references":[{"type":"REPORT","url":"https://github.com/tendermint/tendermint/issues/4926"},{"type":"FIX","url":"https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340"},{"type":"EVIDENCE","url":"https://github.com/tendermint/tendermint/security/advisories/GHSA-6jqj-f58p-mrw3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tendermint/tendermint","events":[{"introduced":"af992361055b5541c1bd388994e386652e4d7254"},{"fixed":"606d0a89ccabbd3e59cff521f9f4d875cc366ac9"},{"fixed":"480b995a31727593f58b361af979054d17d84340"}],"database_specific":{"cpe":"cpe:2.3:a:tendermint:tendermint:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0.33.0"},{"fixed":"0.33.6"}],"source":["CPE_FIELD","REFERENCES"]}}],"versions":["v0.33.0","v0.33.1","v0.33.2","v0.33.3","v0.33.4","v0.33.5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-15091.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}