An issue was discovered in the libsecp256k1 crate before 0.5.0 for Rust. It can verify an invalid signature because it allows the R or S parameter to be larger than the curve order, aka an overflow.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Alpine | 3.14-community | noarch | libsecp256k1 | = 0_git20201009-r1 | UNKNOWN |
Alpine | 3.15-community | noarch | libsecp256k1 | = 0_git20211025-r1 | UNKNOWN |
Alpine | 3.16-community | noarch | libsecp256k1 | = 0_git20211025-r1 | UNKNOWN |
Alpine | 3.17-community | noarch | libsecp256k1 | = 0_git20211025-r1 | UNKNOWN |
Alpine | 3.18-community | noarch | libsecp256k1 | = 0.3.1-r0 | UNKNOWN |
Alpine | 3.19-community | noarch | libsecp256k1 | = 0.3.2-r0 | UNKNOWN |