CVE-2020-36843

Publication date 13 March 2025

Last updated 13 March 2025


Ubuntu priority

The implementation of EdDSA in EdDSA-Java (aka ed25519-java) through 0.3.0 exhibits signature malleability and does not satisfy the SUF-CMA (Strong Existential Unforgeability under Chosen Message Attacks) property. This allows attackers to create new valid signatures different from previous signatures for a known message.

Read the notes from the security team

Status

Package Ubuntu Release Status
libeddsa-java 24.10 oracular
Needs evaluation
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
ruby-ed25519 24.10 oracular
Needs evaluation
24.04 LTS noble
Needs evaluation
22.04 LTS jammy
Needs evaluation
20.04 LTS focal
Needs evaluation

Notes


rodrigo-zaiden

fix is in I2P which can be found in both libeddsa-java and ruby-ed25519.