A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.
{ "license": "CC0-1.0" }
{ "affects": { "functions": [], "arch": [], "os": [] }, "affected_functions": null }
"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2020-0156.json"
null
"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
[ "crypto-failure" ]