libsecp256k1 contains side-channel timing attack
High severity
GitHub Reviewed
Published
Aug 25, 2021
to the GitHub Advisory Database
•
Updated Aug 25, 2023
Description
Reviewed
Aug 19, 2021
Published to the GitHub Advisory Database
Aug 25, 2021
Last updated
Aug 25, 2023
Versions of libsecp256k1 prior to 0.3.1 did not execute
Scalar::check_overflow
in constant time. This allows an attacker to potentially leak information via a timing attack. The flaw was corrected by modifyingScalar::check_overflow
to execute in constant time.References