Use After Free Affecting secp256k1 package, versions >=0.14.0 <0.22.2>=0.23.0 <0.23.5>=0.24.0 <0.24.2


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-SECP256K1-3166288
  • published9 Dec 2022
  • disclosed8 Dec 2022
  • creditMartin Habovštiak

Introduced: 8 Dec 2022

CVE NOT AVAILABLE CWE-416  (opens in a new tab)

How to fix?

Upgrade secp256k1 to version 0.22.2, 0.23.5, 0.24.2 or higher.

Overview

Affected versions of this package are vulnerable to Use After Free due to incorrect bounds on Secp256k1::preallocated_gen_new method.

Note:

Users are unaffected if they either:

  1. don't call Secp256k1::preallocated_gen_new

  2. manually checked that the usage of the method is sound

  3. upgraded to the patched version of secp256k1 (recommended)

CVSS Scores

version 3.1