A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.
{ "license": "CC0-1.0" }
{ "affects": { "arch": [], "os": [], "functions": [] }, "affected_functions": null }
{ "categories": [ "crypto-failure" ], "informational": null, "cvss": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }