A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions.
The product does not verify, or incorrectly verifies, the cryptographic signature for data.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Python-ecdsa | Python-ecdsa_project | * | 0.13.3 (excluding) |
| Red Hat Satellite 6.10 for RHEL 7 | RedHat | python-ecdsa-0:0.13.3-2.el7pc | * |
| Red Hat Satellite 6.10 for RHEL 7 | RedHat | python-ecdsa-0:0.13.3-2.el7pc | * |
| Python-ecdsa | Ubuntu | bionic | * |
| Python-ecdsa | Ubuntu | disco | * |
| Python-ecdsa | Ubuntu | eoan | * |
| Python-ecdsa | Ubuntu | esm-apps/bionic | * |
| Python-ecdsa | Ubuntu | esm-infra/xenial | * |
| Python-ecdsa | Ubuntu | trusty | * |
| Python-ecdsa | Ubuntu | upstream | * |
| Python-ecdsa | Ubuntu | xenial | * |