Description
In Docker Notary before 0.1, gotuf/signed/verify.go has a Signature Algorithm Not Matched to Key vulnerability. Because an attacker controls the field specifying the signature algorithm, they might (for example) be able to forge a signature by forcing a misinterpretation of an RSA-PSS key as Ed25519 elliptic-curve data.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2949 | In Docker Notary before 0.1, gotuf/signed/verify.go has a Signature Algorithm Not Matched to Key vulnerability. Because an attacker controls the field specifying the signature algorithm, they might (for example) be able to forge a signature by forcing a misinterpretation of an RSA-PSS key as Ed25519 elliptic-curve data. |
Github GHSA |
GHSA-785h-hrf7-gqxc | Docker Notary Signature Algorithm Not Matched to Key vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T08:43:41.870Z
Reserved: 2018-03-31T00:00:00.000Z
Link: CVE-2015-9258
No data.
Status : Modified
Published: 2018-03-31T21:29:00.250
Modified: 2024-11-21T02:40:10.657
Link: CVE-2015-9258
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA