From e5b66bfe9ec31f98d7c0033fb2fd074644981ff5 Mon Sep 17 00:00:00 2001 From: Jon Moroney Date: Thu, 9 Sep 2021 14:51:48 -0700 Subject: [PATCH] Add rustsec advisory for GHSA-7cqg-8449-rmfv (#1022) --- crates/libsecp256k1-rs/RUSTSEC-0000-0000.md | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 crates/libsecp256k1-rs/RUSTSEC-0000-0000.md diff --git a/crates/libsecp256k1-rs/RUSTSEC-0000-0000.md b/crates/libsecp256k1-rs/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..0751e41 --- /dev/null +++ b/crates/libsecp256k1-rs/RUSTSEC-0000-0000.md @@ -0,0 +1,16 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "libsecp256k1-rs" +date = "2020-01-22" +url = "https://nvd.nist.gov/vuln/detail/CVE-2019-20399" +categories = ["crypto-failure"] +cvss = "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" +aliases = ["CVE-2019-20399"] +[versions] +patched = [">= 0.3.1"] +``` + +# Observable Discrepancy in libsecp256k1-rs + +A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.