Описание
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| node-elliptic | fixed | 6.5.7+dfsg-1 | package | |
| node-elliptic | no-dsa | bookworm | package | |
| node-elliptic | no-dsa | bullseye | package |
Примечания
https://github.com/indutny/elliptic/pull/317
https://github.com/indutny/elliptic/commit/accb61e9c1a005e5c8ff96a8b33893100bb42d11 (v6.5.7)
Связанные уязвимости
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.
Elliptic's ECDSA missing check for whether leading bit of r and s is zero