Affected versions of this crate did not properly verify ed25519 signatures. Any signature with a correct length was considered valid.
This allows an attacker to impersonate any node identity.
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
libp2p-wasm-ext(7 total, 3 outdated, 1 possibly insecure)
| Crate | Required | Latest | Status |
|---|---|---|---|
| futures | ^0.1 | 0.3.31 | out of date |
| js-sys | ^0.3.19 | 0.3.82 | up to date |
| libp2p-core ⚠️ | ^0.8.0 | 0.43.1 | out of date |
| parity-send-wrapper | ^0.1.0 | 0.1.0 | up to date |
| tokio-io | ^0.1 | 0.1.13 | up to date |
| wasm-bindgen | ^0.2.42 | 0.2.105 | up to date |
| wasm-bindgen-futures | ^0.3.19 | 0.4.55 | out of date |
libp2p-core: Failure to properly verify ed25519 signatures makes any signature validAffected versions of this crate did not properly verify ed25519 signatures. Any signature with a correct length was considered valid.
This allows an attacker to impersonate any node identity.