Description
An issue was discovered in the libsecp256k1 crate before 0.3.1 for Rust. Scalar::check_overflow allows a timing side-channel attack; consequently, attackers can obtain sensitive information.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1757 | An issue was discovered in the libsecp256k1 crate before 0.3.1 for Rust. Scalar::check_overflow allows a timing side-channel attack; consequently, attackers can obtain sensitive information. |
Github GHSA |
GHSA-hrjm-c879-pp86 | libsecp256k1 contains side-channel timing attack |
References
| Link | Providers |
|---|---|
| https://rustsec.org/advisories/RUSTSEC-2019-0027.html |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T03:00:18.834Z
Reserved: 2020-12-31T00:00:00.000Z
Link: CVE-2019-25003
No data.
Status : Modified
Published: 2020-12-31T10:15:14.300
Modified: 2024-11-21T04:39:43.007
Link: CVE-2019-25003
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA