Upstream information
Description
browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 7.5 | 
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N | 
| Attack Vector | Network | 
| Attack Complexity | Low | 
| Privileges Required | None | 
| User Interaction | None | 
| Scope | Unchanged | 
| Confidentiality Impact | None | 
| Integrity Impact | High | 
| Availability Impact | None | 
| CVSSv3 Version | 3.1 | 
SUSE Security Advisories:
- openSUSE-SU-2025:14663-1, published Sat Jan 18 18:49:59 2025
 
List of released packages
| Product(s) | Fixed package version(s) | References | 
|---|---|---|
| SUSE Linux Enterprise Server 16.0 | 
  |  Patchnames:  SUSE Linux Enterprise Server 16.0 GA system-user-velociraptor-1.0.0-160000.2.2  | 
| SUSE Package Hub 15 SP6 | 
  |  Patchnames:  openSUSE-2025-31  | 
| openSUSE Leap 15.6 | 
  |  Patchnames:  openSUSE-2025-31  | 
| openSUSE Tumbleweed | 
  |  Patchnames:  openSUSE-Tumbleweed-2025-14663  | 
SUSE Timeline for this CVE
CVE page created: Thu Oct 26 18:00:15 2023CVE page last modified: Sun Nov 2 13:35:50 2025