You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
secp256k1-node is a Node.js binding for an Optimized C library for EC operations on curve secp256k1. In elliptic-based version, loadUncompressedPublicKey has a check that the public key is on the curve. Prior to versions 5.0.1, 4.0.4, and 3.8.1, however, loadCompressedPublicKey is missing that check. That allows the attacker to use public keys on low-cardinality curves to extract enough information to fully restore the private key from as little as 11 ECDH sessions, and very cheaply on compute power. Other operations on public keys are also affected, including e.g. publicKeyVerify() incorrectly returning true on those invalid keys, and e.g. publicKeyTweakMul() also returning predictable outcomes allowing to restore the tweak. Versions 5.0.1, 4.0.4, and 3.8.1 contain a fix for the issue.
The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
mend-bolt-for-githubbot
changed the title
bitgo-utxo-lib-1.5.0.tgz: 1 vulnerabilities (highest severity is: 5.5)
bitgo-utxo-lib-1.5.0.tgz: 1 vulnerabilities (highest severity is: 7.5)
Oct 20, 2024
mend-bolt-for-githubbot
changed the title
bitgo-utxo-lib-1.5.0.tgz: 1 vulnerabilities (highest severity is: 7.5)
bitgo-utxo-lib-1.5.0.tgz: 2 vulnerabilities (highest severity is: 7.5)
Oct 22, 2024
Vulnerable Library - bitgo-utxo-lib-1.5.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-48930
Vulnerable Library - secp256k1-3.8.0.tgz
This module provides native bindings to ecdsa secp256k1 functions
Library home page: https://registry.npmjs.org/secp256k1/-/secp256k1-3.8.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
secp256k1-node is a Node.js binding for an Optimized C library for EC operations on curve secp256k1. In
elliptic
-based version,loadUncompressedPublicKey
has a check that the public key is on the curve. Prior to versions 5.0.1, 4.0.4, and 3.8.1, however,loadCompressedPublicKey
is missing that check. That allows the attacker to use public keys on low-cardinality curves to extract enough information to fully restore the private key from as little as 11 ECDH sessions, and very cheaply on compute power. Other operations on public keys are also affected, including e.g.publicKeyVerify()
incorrectly returningtrue
on those invalid keys, and e.g.publicKeyTweakMul()
also returning predictable outcomes allowing to restore the tweak. Versions 5.0.1, 4.0.4, and 3.8.1 contain a fix for the issue.Publish Date: 2024-10-21
URL: CVE-2024-48930
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-584q-6j8j-r5pm
Release Date: 2024-10-21
Fix Resolution: secp256k1 - 3.8.1,4.0.4,5.0.1
Step up your Open Source Security Game with Mend here
CVE-2024-48948
Vulnerable Library - elliptic-6.5.7.tgz
Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.5.7.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
Publish Date: 2024-10-15
URL: CVE-2024-48948
CVSS 3 Score Details (4.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-fc9h-whq2-v747
Release Date: 2024-10-28
Fix Resolution: elliptic - 6.6.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: