Source: python-cryptography
Version: 46.0.1-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for python-cryptography.

CVE-2026-26007[0]:
| cryptography is a package designed to expose cryptographic
| primitives and recipes to Python developers. Prior to 46.0.5, the
| public_key_from_numbers (or
| EllipticCurvePublicNumbers.public_key()),
| EllipticCurvePublicNumbers.public_key(), load_der_public_key() and
| load_pem_public_key() functions do not verify that the point belongs
| to the expected prime-order subgroup of the curve. This missing
| validation allows an attacker to provide a public key point P from a
| small-order subgroup. This can lead to security issues in various
| situations, such as the most commonly used signature verification
| (ECDSA) and shared key negotiation (ECDH). When the victim computes
| the shared secret as S = [victim_private_key]P via ECDH, this leaks
| information about victim_private_key mod (small_subgroup_order). For
| curves with cofactor > 1, this reveals the least significant bits of
| the private key. When these weak public keys are used in ECDSA ,
| it's easy to forge signatures on the small subgroup. Only SECT
| curves are impacted by this. This vulnerability is fixed in 46.0.5.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-26007
    https://www.cve.org/CVERecord?id=CVE-2026-26007
[1] https://github.com/pyca/cryptography/security/advisories/GHSA-r6ph-v2qm-q3c2
[2] 
https://github.com/pyca/cryptography/commit/0eebb9dbb6343d9bc1d91e5a2482ed4e054a6d8c

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to