An open index of dependabot pull requests across open source projects.

Bump the npm_and_yarn group across 1 directory with 2 updates

Open
Number: #1
Type: Pull Request
State: Open
Author: dependabot[bot] dependabot[bot]
Association: None
Comments: 0
Created: August 06, 2025 at 03:49 AM UTC
(about 1 month ago)
Updated: August 06, 2025 at 03:49 AM UTC
(about 1 month ago)
Labels:
dependencies javascript
Description:

Bumps the npm_and_yarn group with 2 updates in the / directory: elliptic and ethers.

Updates elliptic from 6.5.4 to 6.6.1

Commits

Updates ethers from 5.6.2 to 5.8.0

Release notes

Sourced from ethers's releases.

ethers/v5.8.0 (2025-02-25 19:15) [legacy version]

This is a security update for the legacy Ethers v5 branch, addressing two security fixes.

For those that wish to audit the specific changes in the the bundled version between v5.7 and v5.8, see this gist.

Changes

  • Updated to latest elliptic library to fix audit warnings. (f8deaae)
  • Added ENS to Sepolia. (0065547)
  • Bump ws package version to address DoS security concern. (#4791; f345816)
  • Added modern networks, updated third-party backend URLs and added QuickNode. (#3935, #4010; f7c813d)

Embedding UMD with SRI:

<script type="text/javascript"
  integrity="sha384-KpyAXoFibPIUEi79EsnN1EtEWCCrOQ8MtGsa4IrVxeZo514PYarFXujnjyu0DzgC"
  crossorigin="anonymous"
  src="https://cdnjs.cloudflare.com/ajax/libs/ethers/5.8.0/ethers.umd.min.js">
</script>

ethers/v5.7.2 (2022-10-19 04:19)


Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-Htz1SE4Sl5aitpvFgr2j0sfsGUIuSXI6t8hEyrlQ93zflEF3a29bH2AvkUROUw7J"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.7.2.umd.min.js">
</script>

ethers/v5.7.1 (2022-09-13 21:28)

  • Fixed message signing errors that clobbered critical Error properties. (#3356; b14cb0f)
  • Add support for all data URL formats. (#3341; 4c86dc9)
  • Added Sepolia network. (#3325; d083522)

... (truncated)

Changelog

Sourced from ethers's changelog.

ethers/v5.8.0 (2025-02-25 19:15)

  • Updated to latest elliptic library to fix audit warnings. (f8deaae)
  • Added ENS to Sepolia. (0065547)
  • Bump ws package version to address DoS security concern. (#4791; f345816)
  • Added modern networks, updated third-party backend URLs and added QuickNode. (#3935, #4010; f7c813d)

ethers/v5.7.2 (2022-10-19 04:19)

ethers/v5.7.1 (2022-09-13 21:28)

  • Fixed message signing errors that clobbered critical Error properties. (#3356; b14cb0f)
  • Add support for all data URL formats. (#3341; 4c86dc9)
  • Added Sepolia network. (#3325; d083522)

ethers/v5.7.0 (2022-08-18 16:17)

  • Update PocketProvider to newer URL format. (#2980; 10d07ca)
  • Add new ENS normalization specification for wider UTF-8 support. (#42, #2376, #2754; 14bf407, fce9aaa, f274104)
  • Added ACTION_REJECTED error for UI-based Signers. (d9897e0)
  • Include current baseFee in feeData for easier custom fee calculation. (8314236)
  • Add restrictions for new UTF-8 specification ENS names. (#42, #2376, #2754; e52fbfb)
  • Expand the definition of a WebSocketLike. (#2843; 00114d7)
  • Expanded type for queryFitler to allow string. (#2882; 60da870)
  • Added finalized and safe blockTags. (#3091; 549168c)
  • Added arbitrum-goerli to Networks and AlchemyProvider. (#3246; e72d13e)
  • Add EIP-712 type exports. (#221; 7ce41cd)
  • Added optimism-goerli to AlchemyProvider. (#3246; f1cb0d2)
  • Updated EtherscanProvider for new CommunityResource API throttling. (6bd13c3)
  • Fix old events from being emitted at the beginning of a filter. (#3069, #3094; ea2d245)
  • Fixed Interface signautres missing strings as eventFragments. (#3157; c004ae5)
  • Fix bug in EIP1193Bridge forwarding to the wrong method. (#3166; 17676e9)
  • Use updated Web3 Secret Storage format for JSON wallets. (#3075; 6f57e8b)
  • Relaxed nameprep length requirement dropping RFC-5891 section 4.2.4. (#3161; abdf2e3)
  • Switch to hash.js for ripemd160 on node as it was removed from the default crypto provider in node 17. (#3082; 450694e)
  • Add optimism-kovan to EtherscanProvider. (#3135; 4d3e586)
  • Forward any blockTag along in the FallbackProvider during call. (#3168; ab43e7d)
  • Allow browser fetch option overrides. (#3096; c309df8)

ethers/v5.6.9 (2022-06-17 14:44)

... (truncated)

Commits
  • 5ff3dc9 admin: updated dist files with update-versions
  • 808153e admin: updated sort issue in package.json
  • f8deaae Updated to latest elliptic library to fix audit warnings.
  • c6a1b15 Updated browser tests; but karma is still defunct
  • c7c07f5 admin: update dist files
  • 01dccc7 tests: swapped goerli for sepolia; contracts re-deployed
  • 0065547 Added ENS to Sepolia.
  • d7e8ad1 admin: updated dist files
  • f345816 Bump ws package version to address DoS security concern (#4791).
  • 9f42637 tests: updates test details
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.
Pull Request Statistics
Commits:
1
Files Changed:
2
Additions:
+629
Deletions:
-585
Package Dependencies
Package:
elliptic
Ecosystem:
npm
Version Change:
6.5.4 → 6.6.1
Update Type:
Minor
Package:
ethers
Ecosystem:
npm
Version Change:
5.6.2 → 5.8.0
Update Type:
Minor
Security Advisories
Elliptic's EDDSA missing signature length check
GHSA-f7q4-pwc6-w24p CVE-2024-42459 LOW
In the Elliptic package 6.5.6 for Node.js, EDDSA signature malleability occurs because there is a missing signature length check, and thus zero-valued bytes can be removed or appended.
ws affected by a DoS when handling a request with many HTTP headers
GHSA-3h5v-q93c-6h6q CVE-2024-37890 HIGH
### Impact A request with a number of headers exceeding the[`server.maxHeadersCount`][] threshold could be used to crash a ws server. ### Proof of concept ```js const http = require('http'); con...
Valid ECDSA signatures erroneously rejected in Elliptic
GHSA-fc9h-whq2-v747 CVE-2024-48948 LOW
The Elliptic prior to 6.6.0 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the ell...
Elliptic allows BER-encoded signatures
GHSA-49q7-c7j4-3p7m CVE-2024-42461 LOW
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because BER-encoded signatures are allowed.
Elliptic's ECDSA missing check for whether leading bit of r and s is zero
GHSA-977x-g7h5-7qgw CVE-2024-42460 LOW
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.
Elliptic's verify function omits uniqueness validation
GHSA-434g-2637-qmqr CVE-2024-48949 LOW
The Elliptic package 6.5.5 for Node.js for EDDSA implementation does not perform the required check if the signature proof(s) is within the bounds of the order n of the base point of the elliptic c...
Technical Details
ID: 4666817
UUID: 2722958223
Node ID: PR_kwDOPZE85s6iTQuP
Host: GitHub
Repository: Reality2byte/abiencoder
Merge State: Unknown