CVE-2022-24884
NixOS vulnerability analysis and mitigation

Overview

CVE-2022-24884 affects ecdsautils, a tiny collection of programs used for ECDSA (keygen, sign, verify). The vulnerability was discovered and disclosed in May 2022, impacting all versions of ecdsautils prior to 0.4.1. The issue affects both the ecdsautil verify CLI command and the libecdsautil library (GitHub Advisory).

Technical details

The vulnerability stems from the ecdsa_verify_[prepare_]legacy() function not checking whether the signature values r and s are non-zero. This implementation flaw means that a signature consisting only of zeroes is always considered valid. The issue is particularly severe because requiring multiple signatures from different public keys does not mitigate the problem - ecdsa_verify_list_legacy() will accept an arbitrary number of such forged signatures. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (High) by NIST and 10.0 (Critical) by GitHub (NVD).

Impact

The vulnerability allows attackers to bypass signature verification by using forged signatures consisting of zero values. This completely undermines the cryptographic security of the signature verification process, making it trivial to forge valid signatures (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in ecdsautils version 0.4.1. The fix implements proper verification of signature values by checking that both r and s values are non-zero. Users are strongly recommended to upgrade to version 0.4.1 or later. The fix is API and ABI compatible with version 0.4.0 (GitHub Advisory).

Community reactions

Multiple Linux distributions responded to this vulnerability by releasing security updates, including Debian (DSA-5132-1) and Fedora (versions 34, 35, and 36). The vulnerability was considered significant enough to warrant immediate security advisories from these major distributions (Debian Security, Fedora Update).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68120MEDIUM5.4
  • NixOSNixOS
  • go
NoYesDec 30, 2025
CVE-2025-69413MEDIUM5.3
  • NixOSNixOS
  • code.gitea.io/gitea
NoYesJan 01, 2026
CVE-2025-15412MEDIUM4.8
  • NixOSNixOS
  • wabt
NoNoJan 01, 2026
CVE-2025-15411MEDIUM4.8
  • NixOSNixOS
  • wabt
NoNoJan 01, 2026
CVE-2025-68932LOW2.9
  • NixOSNixOS
  • freshrss
NoYesDec 27, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management