In Rhonabwy through 1.1.13, HMAC signature verification uses a strcmp function that is vulnerable to side-channel attacks, because it stops the comparison when the first difference is spotted in the two signatures. (The fix uses gnutls_memcmp, which has constant-time execution.)
References
Configurations
History
18 Oct 2024, 14:08
Type | Values Removed | Values Added |
---|---|---|
First Time |
Debian
Rhonabwy Project rhonabwy Rhonabwy Project Debian debian Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* cpe:2.3:a:rhonabwy_project:rhonabwy:*:*:*:*:*:*:*:* |
|
References | () https://github.com/babelouest/rhonabwy/commit/f9fd9a1c77e48b514ebb3baf0360f87eef3d846e - Patch | |
CWE | CWE-203 |
01 Aug 2024, 13:47
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
CWE | CWE-1255 |
11 Feb 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-11 03:15
Updated : 2024-10-18 14:08
NVD link : CVE-2024-25714
Mitre link : CVE-2024-25714
CVE.ORG link : CVE-2024-25714
JSON object : View
Products Affected
debian
- debian_linux
rhonabwy_project
- rhonabwy