You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
libsecp256k1 contains side-channel timing attack
High severity
GitHub Reviewed
Published
Aug 25, 2021
to the GitHub Advisory Database
•
Updated Aug 25, 2023
Versions of libsecp256k1 prior to 0.3.1 did not execute Scalar::check_overflow in constant time. This allows an attacker to potentially leak information via a timing attack. The flaw was corrected by modifying Scalar::check_overflow to execute in constant time.
Versions of libsecp256k1 prior to 0.3.1 did not execute
Scalar::check_overflow
in constant time. This allows an attacker to potentially leak information via a timing attack. The flaw was corrected by modifyingScalar::check_overflow
to execute in constant time.References