GHSA-2ff4-xfpr-m32r: `Slip10Like` derivation method instantiated with certain curves may allow attacker to find derivation path which results into very long derivation (possible DoS)
Impacted are the only ones who use hd_wallet::Slip10Like
or slip_10
derivation method instantiated with curves other than secp256k1 and secp256r1.
hd_wallet
crate used to provide Slip10Like
derivation method, which is also provided in slip-10
crate as a default derivation method. It’s based on slip10 method that searches for a valid child key in an infinite loop until it’s found.
Theoretically, this could be exploited by an attacker by finding a derivation path that would force someone to execute a lot of iterations of this loop to find a valid child key. This attack, however, requires the probability of getting an invalid scalar from random 32 bytes to be high. Slip10 is protected from this attack as it’s only defined on secp256k1 and secp256r1 curves, for which such probability is very low:
- For secp256k1, probability is $< 2^{-127}$. This means that a loop with 2 or more iterations is vanishingly impossible.
- For secp256r1, probability is $< 2^{-32}$. This means that a loop with 5 or more iterations is vanishingly impossible.
While standard curves are safe to use with slip10, we used to allow slip10-like derivation which can be instantiated with any curve. For instance, one could instantiate it with ed25519 or stark curves, for which probability of getting invalid scalar from random 32 bytes is >90%, so theoretically, attacker could try to DoS such construction.
References
Detect and mitigate GHSA-2ff4-xfpr-m32r with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →