First published: Thu Jul 20 2023(Updated: )
It was discovered that ECDSA Util did not properly verify certain signature values. An attacker could possibly use this issue to bypass signature verification.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/ecdsautils | <0.3.2+git20151018-2+deb10u1build0.22.04.1 | 0.3.2+git20151018-2+deb10u1build0.22.04.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/ecdsautils | <0.3.2+git20151018-2+deb10u1build0.20.04.1 | 0.3.2+git20151018-2+deb10u1build0.20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/ecdsautils | <0.3.2+git20151018-2ubuntu0.18.04.1~esm1 | 0.3.2+git20151018-2ubuntu0.18.04.1~esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/ecdsautils | <0.3.2+git20151018-2ubuntu0.16.04.1~esm1 | 0.3.2+git20151018-2ubuntu0.16.04.1~esm1 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6239-1 is considered moderate due to the potential for bypassing signature verification.
You can fix USN-6239-1 by updating the ecdsautils package to the recommended versions specified for your Ubuntu release.
USN-6239-1 affects Ubuntu versions 16.04, 18.04, 20.04, and 22.04 with specific versions of the ecdsautils package.
Currently, there are no known workarounds for USN-6239-1; patching is the recommended action.
Ecdsautils is a package in Ubuntu that engages with ECDSA signatures, and USN-6239-1 addresses a vulnerability in how it verifies the signatures.