A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.
{ "license": "CC0-1.0" }
{ "affected_functions": null, "affects": { "os": [], "functions": [], "arch": [] } }
{ "cvss": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "informational": null, "categories": [ "crypto-failure" ] }