CVE-2019-25003: libsecp256k1 contains side-channel timing attack
(updated )
Versions of libsecp256k1 prior to 0.3.1 did not execute Scalar::check_overflow
in constant time. This allows an attacker to potentially leak information via a timing attack. The flaw was corrected by modifying Scalar::check_overflow
to execute in constant time.
References
Detect and mitigate CVE-2019-25003 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →