Ed25519 Signature Malleability in ed25519-java Due to Missing Scalar Range Check
Moderate severity
GitHub Reviewed
Published
Mar 13, 2025
to the GitHub Advisory Database
•
Updated Mar 13, 2025
Description
Published by the National Vulnerability Database
Mar 13, 2025
Published to the GitHub Advisory Database
Mar 13, 2025
Reviewed
Mar 13, 2025
Last updated
Mar 13, 2025
The implementation of EdDSA in EdDSA-Java (aka ed25519-java) through 0.3.0 exhibits signature malleability and does not satisfy the SUF-CMA (Strong Existential Unforgeability under Chosen Message Attacks) property. This allows attackers to create new valid signatures different from previous signatures for a known message.
References