A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.
{ "license": "CC0-1.0" }
{ "affects": { "os": [], "arch": [], "functions": [] }, "affected_functions": null }
[ "crypto-failure" ]
"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
null