Source: pycryptodome Version: 3.4.7-1 Severity: important Tags: patch security upstream Forwarded: https://github.com/Legrandin/pycryptodome/issues/90
Hi, the following vulnerability was published for pycryptodome. CVE-2018-6594[0]: | lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates | weak ElGamal key parameters, which allows attackers to obtain | sensitive information by reading ciphertext data (i.e., it does not | have semantic security in face of a ciphertext-only attack). The | Decisional Diffie-Hellman (DDH) assumption does not hold for | PyCrypto's ElGamal implementation. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-6594 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6594 [1] https://github.com/Legrandin/pycryptodome/issues/90 [2] https://github.com/Legrandin/pycryptodome/commit/99c27a3b9e8a884bbde0e88c63234b669d4398d8 Regards, Salvatore