An issue was discovered in the libsecp256k1 crate before 0.5.0 for Rust. It can verify an invalid signature because it allows the R or S parameter to be larger than the curve order, aka an overflow.
{
"nvd_published_at": "2021-08-08T06:15:00Z",
"severity": "CRITICAL",
"cwe_ids": [
"CWE-190",
"CWE-347"
],
"github_reviewed": true,
"github_reviewed_at": "2021-08-18T21:20:32Z"
}