Control: tags -1 + confirmed

On Fri, 2026-03-06 at 09:03 +0700, Arnaud Rebillout wrote:
> [ Reason ]
> 
> Backport patch for CVE-2026-26007.
> 
> Prior to 46.0.5, the public_key_from_numbers (or
> EllipticCurvePublicNumbers.public_key()),
> EllipticCurvePublicNumbers.public_key(), load_der_public_key() and
> load_pem_public_key() functions do not verify that the point belongs
> to the expected prime-order subgroup of the curve. This missing
> validation allows an attacker to provide a public key point P from a
> small-order subgroup. This can lead to security issues in various
> situations, such as the most commonly used signature verification
> (ECDSA) and shared key negotiation (ECDH). When the victim computes
> the shared secret as S = [victim_private_key]P via ECDH, this leaks
> information about victim_private_key mod (small_subgroup_order). For
> curves with cofactor 1, this reveals the least significant bits of
> the private key. When these weak public keys are used in ECDSA , it's
> easy to forge signatures on the small subgroup. Only SECT curves are
> impacted by this. This vulnerability is fixed in 46.0.5.

Please go ahead.

Regards,

Adam

Reply via email to