发布时间: 2025年3月29日
修改时间: 2025年3月29日
The implementation of EdDSA in EdDSA-Java (aka ed25519-java) through 0.3.0 exhibits signature malleability and does not satisfy the SUF-CMA (Strong Existential Unforgeability under Chosen Message Attacks) property. This allows attackers to create new valid signatures different from previous signatures for a known message.
NVD | openEuler | |
---|---|---|
Confidentiality | None | |
Attack Vector | Local | |
CVSS评分 | N/A | 4.3 |
Attack Complexity | Low | |
Privileges Required | None | |
Scope | Changed | |
Integrity | Low | |
User Interaction | None | |
Availability | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2025-2458 | ed25519-java security update | 2025年5月1日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-5A | ed25519-java | Fixed |
KY3.5.3 | ed25519-java | Fixed |
V6 | ed25519-java | Fixed |