From 783394f059701132125c5be8cc619d84bac03d36 Mon Sep 17 00:00:00 2001 From: Tony Arcieri Date: Mon, 14 Oct 2019 08:32:15 -0700 Subject: [PATCH] Assign RUSTSEC-2019-0027 to libsecp256k1 Original PR: https://github.com/RustSec/advisory-db/pull/194 --- .../{RUSTSEC-0000-0000.toml => RUSTSEC-2019-0027.toml} | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) rename crates/libsecp256k1/{RUSTSEC-0000-0000.toml => RUSTSEC-2019-0027.toml} (83%) diff --git a/crates/libsecp256k1/RUSTSEC-0000-0000.toml b/crates/libsecp256k1/RUSTSEC-2019-0027.toml similarity index 83% rename from crates/libsecp256k1/RUSTSEC-0000-0000.toml rename to crates/libsecp256k1/RUSTSEC-2019-0027.toml index bc93252..6bc8eb0 100644 --- a/crates/libsecp256k1/RUSTSEC-0000-0000.toml +++ b/crates/libsecp256k1/RUSTSEC-2019-0027.toml @@ -1,5 +1,5 @@ [advisory] -id = "RUSTSEC-0000-0000" +id = "RUSTSEC-2019-0027" package = "libsecp256k1" date = "2019-10-14" title = "Flaw in Scalar::check_overflow allows side-channel timing attack" @@ -15,4 +15,6 @@ constant time. patched_versions = [">= 0.3.1"] categories = ["crypto-failure"] keywords = ["crypto", "sidechannel"] -functions = { "libsecp256k1::Scalar::check_overflow" = ["< 0.3.1"] } + +[affected.functions] +"libsecp256k1::Scalar::check_overflow" = ["< 0.3.1"]