First published: Thu May 30 2024(Updated: )
It was discovered that browserify-sign incorrectly handled an upper bound check in signature verification. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to perform a signature forgery attack.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/node-browserify-sign | <4.2.1-3ubuntu0.1 | 4.2.1-3ubuntu0.1 |
Ubuntu Linux | =23.10 | |
All of | ||
ubuntu/node-browserify-sign | <4.2.1-2ubuntu0.1 | 4.2.1-2ubuntu0.1 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/node-browserify-sign | <4.0.4-2ubuntu0.20.04.1 | 4.0.4-2ubuntu0.20.04.1 |
Ubuntu Linux | =20.04 | |
All of | ||
ubuntu/node-browserify-sign | <4.0.4-2ubuntu0.18.04.1~esm1 | 4.0.4-2ubuntu0.18.04.1~esm1 |
Ubuntu Linux | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.