An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS14Mjc5LTY4cnItanA0cM4AAvME

Blst vulnerable to incorrect results for some inputs in blst_fp_eucl_inverse function


Blst versions v0.3.0 to v0.3.2 can produce the incorrect outputs for some inputs to the blst_fp_eucl_inverse function. This could theoretically result in the creation of an invalid signature from correct inputs. However, fuzzing of higher level functions such as sign and verify were unable to produce incorrect results and there has been no reported occurrences of this issue being encountered in production use.


During the course of differential fuzzing of the blst library by @guidovranken it was discovered that blst would produce the incorrect result for some input values in the inverse function. This was the result of the introduction of a new inversion formula in version v0.3.0. This source of these incorrect outputs was due to two issues:

  1. The amount of inner loop iterations was not sufficient for the algorithm to converge.
  2. It was erroneously assumed that the absolute value of the intermediate result would be capped at 767-bits. As a result, some output values were truncated by one bit or the most significant bit was misinterpreted as the sign.


This issue has been resolved in the v0.3.3 release and users are recommended to upgrade immediately.


The software used to uncover this issue can be found here.


A special thanks to Guido Vranken (@guidovranken) for his discovery and disclosure of this vulnerability.

For more information

If you have any questions or comments about this advisory please email us at [email protected]

Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 12 months ago
Updated: 8 months ago

Identifiers: GHSA-x279-68rr-jp4p

Affected Packages
Versions: >= 0.3.0, < 0.3.3
Fixed in: 0.3.3