Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2997-1 | ecdsautils security update |
Debian DSA |
DSA-5132-1 | ecdsautils security update |
EUVD |
EUVD-2022-29652 | ecdsautils is a tiny collection of programs used for ECDSA (keygen, sign, verify). `ecdsa_verify_[prepare_]legacy()` does not check whether the signature values `r` and `s` are non-zero. A signature consisting only of zeroes is always considered valid, making it trivial to forge signatures. Requiring multiple signatures from different public keys does not mitigate the issue: `ecdsa_verify_list_legacy()` will accept an arbitrary number of such forged signatures. Both the `ecdsautil verify` CLI command and the libecdsautil library are affected. The issue has been fixed in ecdsautils 0.4.1. All older versions of ecdsautils (including versions before the split into a library and a CLI utility) are vulnerable. |
Ubuntu USN |
USN-6239-1 | ECDSA Util vulnerability |
Wed, 23 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-23T18:29:53.064Z
Reserved: 2022-02-10T00:00:00.000Z
Link: CVE-2022-24884
Updated: 2024-08-03T04:29:00.636Z
Status : Modified
Published: 2022-05-06T00:15:07.697
Modified: 2024-11-21T06:51:19.097
Link: CVE-2022-24884
No data.
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN