QID 981445

QID 981445: Python (pip) Security Update for ecdsa (GHSA-pwfw-mgfj-7g3g)

Security update has been released for ecdsa to fix the vulnerability.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Code using `VerifyingKey.verify()` and `VerifyingKey.verify_digest()` may receive exceptions other than the documented `BadSignatureError` when signatures are malformed. If those other exceptions are not caught, they may lead to program termination and thus Denial of Service

Code using `VerifyingKey.verify()` and `VerifyingKey.verify_digest()` with `sigdecode` option using `ecdsa.util.sigdecode_der` will accept signatures even if they are not properly formatted DER. This makes the signatures malleable. It impacts only applications that later sign the signatures or verify signatures of signatures, e.g. Bitcoin.

All versions between 0.5 and 0.13.2 (inclusive) are thought to be vulnerable. Code before 0.5 may be vulnerable but didn't receive extended analysis to rule this issue out.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    The patches have been merged to `master` branch in https://github.com/warner/python-ecdsa/pull/115.
    The backported patches for a release in the 0.13 branch are in https://github.com/warner/python-ecdsa/pull/124

    They are part of the 0.13.3 release.

    There are no plans to backport them to earlier releases.Workaround:
    It may be possible to prevent the Denial of Service by catching also `UnexpectedDER`, `IndexError` and `AssertionError` exceptions. That list hasn't been verified to be complete though. If those exceptions are raised, the signature verification process should consider the signature to be invalid.

    To remediate signature malleability and the Denial of Service vulnerability, it may be possible to first verify that the signature is properly DER formatted ECDSA-Sig-Value, as defined in [RFC3279](https://tools.ietf.org/html/rfc3279), before passing it to `verify()` or `verify_digest()` methods. If the signature is determined to not follow the DER or encode a different structure, the signature verification process should consider the signature to be invalid.
    Vendor References

    CVEs related to QID 981445

    Software Advisories
    Advisory ID Software Component Link
    GHSA-pwfw-mgfj-7g3g ecdsa URL Logo github.com/advisories/GHSA-pwfw-mgfj-7g3g