A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.
{ "github_reviewed": true, "cwe_ids": [ "CWE-203", "CWE-362" ], "github_reviewed_at": "2021-07-27T15:21:02Z", "nvd_published_at": "2020-01-23T00:15:00Z", "severity": "MODERATE" }