Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

gurukamath
Copy link
Contributor

What was wrong?

The current sender recovery does not check if the r value in the signature is a valid one.

How was it fixed?

Add a additional check to the secp256k1_recover function.

@gurukamath gurukamath merged commit 10125b1 into ethereum:forks/prague Sep 19, 2024
5 checks passed
@gurukamath gurukamath deleted the sig-recovery-checks branch December 13, 2024 09:54
gurukamath added a commit to gurukamath/execution-specs that referenced this pull request Jan 31, 2025
gurukamath added a commit that referenced this pull request Feb 3, 2025
* port #1098 to prague

* port #1011 to prague
nerolation pushed a commit to nerolation/execution-specs that referenced this pull request Feb 7, 2025
nerolation pushed a commit to nerolation/execution-specs that referenced this pull request Feb 9, 2025
nerolation pushed a commit to nerolation/execution-specs that referenced this pull request Feb 10, 2025
fselmo pushed a commit to fselmo/execution-specs that referenced this pull request Apr 9, 2025
SamWilsn pushed a commit to SamWilsn/eth1.0-specs that referenced this pull request Apr 11, 2025
SamWilsn pushed a commit that referenced this pull request May 15, 2025
* port #1098 to prague

* port #1011 to prague
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants