CVE-2022-24771

NameCVE-2022-24771
DescriptionForge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
node-node-forge (PTS)buster0.8.1~dfsg-1+deb10u1fixed
bullseye0.10.0~dfsg-3+deb11u1fixed
sid1.3.0~dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
node-node-forgesourcebuster0.8.1~dfsg-1+deb10u1
node-node-forgesourcebullseye0.10.0~dfsg-3+deb11u1
node-node-forgesource(unstable)1.3.0~dfsg-1

Notes

https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765
https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1 (v1.3.0)

Search for package or bug name: Reporting problems