This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate ethsign

Dependencies

(7 total, 4 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 libsecp256k1 ⚠️^0.2.20.7.2out of date
 memzero^0.10.1.0up to date
 parity-crypto^0.30.9.0out of date
 rand^0.60.9.1out of date
 rustc-hex^2.02.1.0up to date
 secp256k1^0.120.30.0out of date
 serde^1.01.0.219up to date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 serde_json^1.01.0.140up to date

Security Vulnerabilities

libsecp256k1: Flaw in Scalar::check_overflow allows side-channel timing attack

RUSTSEC-2019-0027

Versions of libsecp256k1 prior to 0.3.1 did not execute Scalar::check_overflow in constant time.

This allows an attacker to potentially leak information via a timing attack.

The flaw was corrected by modifying Scalar::check_overflow to execute in constant time.

libsecp256k1: libsecp256k1 allows overflowing signatures

RUSTSEC-2021-0076

libsecp256k1 accepts signatures whose R or S parameter is larger than the secp256k1 curve order, which differs from other implementations. This could lead to invalid signatures being verified.

The error is resolved in 0.5.0 by adding a check_overflow flag.