First published: Sat Mar 31 2018(Updated: )
In Docker Notary before 0.1, gotuf/signed/verify.go has a Signature Algorithm Not Matched to Key vulnerability. Because an attacker controls the field specifying the signature algorithm, they might (for example) be able to forge a signature by forcing a misinterpretation of an RSA-PSS key as Ed25519 elliptic-curve data.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/docker/notary | <0.1.0 | 0.1.0 |
Docker Notary | <0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-9258 is considered a medium severity vulnerability due to potential signature forgery risks.
To fix CVE-2015-9258, update Docker Notary to version 0.1.0 or later.
CVE-2015-9258 is a Signature Algorithm Not Matched to Key vulnerability.
CVE-2015-9258 affects all versions of Docker Notary prior to 0.1.0.
An attacker exploiting CVE-2015-9258 could forge a signature by manipulating the signature algorithm field.