httpsig-rs is a Rust implementation of IETF RFC 9421 http message signatures. Prior to version 0.0.19, the HMAC signature comparison is not timing-safe. This makes anyone who uses HS256 signature verification vulnerable to a timing attack that allows the attacker to forge a signature. Version 0.0.19 fixes the issue.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-29041 | httpsig-rs is a Rust implementation of IETF RFC 9421 http message signatures. Prior to version 0.0.19, the HMAC signature comparison is not timing-safe. This makes anyone who uses HS256 signature verification vulnerable to a timing attack that allows the attacker to forge a signature. Version 0.0.19 fixes the issue. |
Github GHSA |
GHSA-q7pg-9pr4-mrp2 | httpsig-rs: HMAC verification is vulnerable to timing attack |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 12 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 12 Sep 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | httpsig-rs is a Rust implementation of IETF RFC 9421 http message signatures. Prior to version 0.0.19, the HMAC signature comparison is not timing-safe. This makes anyone who uses HS256 signature verification vulnerable to a timing attack that allows the attacker to forge a signature. Version 0.0.19 fixes the issue. | |
| Title | httpsig-rs's HMAC verification is vulnerable to timing attack | |
| Weaknesses | CWE-208 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-12T13:45:48.203Z
Reserved: 2025-09-08T16:19:26.173Z
Link: CVE-2025-59058
Updated: 2025-09-12T13:43:36.110Z
Status : Awaiting Analysis
Published: 2025-09-12T14:15:41.773
Modified: 2025-09-15T15:21:42.937
Link: CVE-2025-59058
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA