In Rhonabwy through 1.1.13, HMAC signature verification uses a strcmp function that is vulnerable to side-channel attacks, because it stops the comparison when the first difference is spotted in the two signatures. (The fix uses gnutls_memcmp, which has constant-time execution.)

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Rhonabwy Project Subscribe
Rhonabwy Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 18 Oct 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Debian
Debian debian Linux
Rhonabwy Project
Rhonabwy Project rhonabwy
Weaknesses CWE-203
CPEs cpe:2.3:a:rhonabwy_project:rhonabwy:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
Vendors & Products Debian
Debian debian Linux
Rhonabwy Project
Rhonabwy Project rhonabwy
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-01T23:52:06.192Z

Reserved: 2024-02-11T00:00:00

Link: CVE-2024-25714

cve-icon Vulnrichment

Updated: 2024-08-01T23:52:06.192Z

cve-icon NVD

Status : Modified

Published: 2024-02-11T03:15:09.393

Modified: 2024-11-21T09:01:15.770

Link: CVE-2024-25714

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses