You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
petermetz opened this issue
Dec 8, 2021
· 0 comments
· Fixed by #1640
Assignees
Labels
BesudependenciesPull requests that update a dependency fileP1Priority 1: HighestQuorumSecurityRelated to existing or potential security vulnerabilitiesXdaiTasks/bugs related to the Xdai network and the corresponding ledger connector plugin in Cactus
2 elliptic vulnerabilities found in yarn.lock 16 days ago
Remediation
Upgrade elliptic to version 6.5.4 or later. For example:
elliptic@^6.5.4:
version "6.5.4"
Always verify the validity and compatibility of suggestions with your codebase.
Details CVE-2020-28498GHSA-r9p9-mrjm-926w
moderate severity
Vulnerable versions: < 6.5.4
Patched version: 6.5.4
The npm package elliptic before version 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.
CVE-2020-13822GHSA-vh7m-p724-62c2
high severity
Vulnerable versions: < 6.5.3
Patched version: 6.5.3
The Elliptic package before version 6.5.3 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.
petermetz
added
dependencies
Pull requests that update a dependency file
P1
Priority 1: Highest
Security
Related to existing or potential security vulnerabilities
Besu
Quorum
Xdai
Tasks/bugs related to the Xdai network and the corresponding ledger connector plugin in Cactus
labels
Dec 8, 2021
petermetz
added a commit
to petermetz/cacti
that referenced
this issue
Dec 8, 2021
Upgrade the web3 packages in besu connector and the hermes ODAP plugin
to eliminate some of the security vulnerabilities that were reported by the
robots.
Fixeshyperledger-cacti#1639
Signed-off-by: Peter Somogyvari <peter.somogyvari@accenture.com>
Upgrade the web3 packages in besu connector and the hermes ODAP plugin
to eliminate some of the security vulnerabilities that were reported by the
robots.
Fixes#1639
Signed-off-by: Peter Somogyvari <peter.somogyvari@accenture.com>
BesudependenciesPull requests that update a dependency fileP1Priority 1: HighestQuorumSecurityRelated to existing or potential security vulnerabilitiesXdaiTasks/bugs related to the Xdai network and the corresponding ledger connector plugin in Cactus
Took for web3 versions in package.json files:
grep -r -i --include=package.json '"web3' ./ --exclude-dir=node_modules
2 elliptic vulnerabilities found in yarn.lock 16 days ago
Remediation
Upgrade elliptic to version 6.5.4 or later. For example:
elliptic@^6.5.4:
version "6.5.4"
Always verify the validity and compatibility of suggestions with your codebase.
Details
CVE-2020-28498 GHSA-r9p9-mrjm-926w
moderate severity
Vulnerable versions: < 6.5.4
Patched version: 6.5.4
The npm package elliptic before version 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.
CVE-2020-13822 GHSA-vh7m-p724-62c2
high severity
Vulnerable versions: < 6.5.3
Patched version: 6.5.3
The Elliptic package before version 6.5.3 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.
Assignees:@petermetz
Labels: Security,dependencies,P1,bug
The text was updated successfully, but these errors were encountered: