CVE-2019-14859

NameCVE-2019-14859
DescriptionA flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1978-1, DSA-4588-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-ecdsa (PTS)bullseye0.16.1-1fixed
bookworm0.18.0-3fixed
sid, trixie0.19.0-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-ecdsasourcejessie0.11-1+deb8u1DLA-1978-1
python-ecdsasourcestretch0.13-2+deb9u1DSA-4588-1
python-ecdsasourcebuster0.13-3+deb10u1DSA-4588-1
python-ecdsasource(unstable)0.13.3-1

Notes

https://github.com/warner/python-ecdsa/issues/114
Upstream patches:
https://github.com/warner/python-ecdsa/pull/115
https://github.com/warner/python-ecdsa/pull/124
Fix for CVE-2019-14853 fixes as well CVE-2019-14859.

Search for package or bug name: Reporting problems