Add advisory for timing variability in curve25519-dalek-ng
The timing variability in curve25519-dalek that was reported via RUSTSEC-2024-0344 is also applicable to its fork curve25519-dalek-ng.
This is relevant because crates such as ed255519-consensus, which are actively used by the community for secret key operations, depend on the vulnerable curve25519-dalek-ng.
As a matter of policy, we don't publish advisories without confirmation/agreement from the maintainer, unless the maintainer becomes unresponsive (for 270 days in case of no open issues or 60 days in case of a potential vulnerability).
@hdevalence are you aware of this issue? Do you agree it warrants an advisory?
I don't think this issue warrants an advisory, but I don't think it's particularly important either way. It should be fixed shortly, just fell through the cracks and there was no follow up.
I don't think this issue warrants an advisory,
Why not? If the pre-fork code had one, it seems surprising that this crate wouldn't get one.
Are there maybe any updates regarding this?
Are there maybe any updates regarding this?
It's up to @hdevalence.