Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Resolve GitHub CVE advisory by updating to latest elliptic #186

Merged

Conversation

LucianBuzzo
Copy link
Contributor

In versions of elliptic prior to 6.5.4, there is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.

See GHSA-r9p9-mrjm-926w

In versions of elliptic prior to 6.5.4, there is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.

See GHSA-r9p9-mrjm-926w
@fanatid fanatid merged commit 4223dd4 into cryptocoinjs:master Jan 8, 2022
@fanatid
Copy link
Member

fanatid commented Jan 8, 2022

Thank you. Published in 4.0.3.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants