Skip to content

Expect to solve the security issues of eddsa #636

@SomerGG

Description

@SomerGG

my xrpl4j version

<dependency>
      <groupId>org.xrpl</groupId>
      <artifactId>xrpl4j-client</artifactId>
      <version>4.1.0</version>
</dependency>
<dependency>
      <groupId>org.xrpl</groupId>
      <artifactId>xrpl4j-core</artifactId>
      <version>4.1.0</version>
</dependency>

Dependencies with security issues

<dependency>
      <groupId>net.i2p.crypto</groupId>
      <artifactId>eddsa</artifactId>
</dependency>

GHSA-p53j-g8pw-4w5f, Score: 4.3
The implementation of EdDSA in EdDSA-Java (aka ed25519-java) through 0.3.0 exhibits signature malleability and does not satisfy the SUF-CMA (Strong Existential Unforgeability under Chosen Message Attacks) property. This allows attackers to create new valid signatures different from previous signatures for a known message

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions