Bug 2318778 (CVE-2024-48948)

Summary: CVE-2024-48948 elliptic: ECDSA signature verification error may reject legitimate transactions
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: akostadi, alcohan, amasferr, anjoseph, bdettelb, cbartlet, cdaley, chazlett, dmayorov, doconnor, erack, gkamathe, gotiwari, gparvin, jcantril, jchui, jhorak, jlledo, jprabhak, jwendell, ktsao, lbainbri, lchilton, mjaros, mkudlej, mmakovy, mvyas, nboldt, njean, owatkins, pahickey, rcernich, rhaigner, rtaniwa, sdawley, sfeifer, teagle, tjochec, tkral, tpopela, twalsh, wtam
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Elliptic Node.js package. In certain versions, the ECDSA implementation does not correctly verify valid signatures if the hash contains at least 4 leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash. This issue can lead to valid signatures being rejected and a potential service disruption.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2024-10-15 14:01:08 UTC
The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.