httpsig-rs is a Rust implementation of IETF RFC 9421 http message signatures. Prior to version 0.0.19, the HMAC signature comparison is not timing-safe. This makes anyone who uses HS256 signature verification vulnerable to a timing attack that allows the attacker to forge a signature. Version 0.0.19 fixes the issue.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 12 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 12 Sep 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | httpsig-rs is a Rust implementation of IETF RFC 9421 http message signatures. Prior to version 0.0.19, the HMAC signature comparison is not timing-safe. This makes anyone who uses HS256 signature verification vulnerable to a timing attack that allows the attacker to forge a signature. Version 0.0.19 fixes the issue. | |
Title | httpsig-rs's HMAC verification is vulnerable to timing attack | |
Weaknesses | CWE-208 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-12T13:45:48.203Z
Reserved: 2025-09-08T16:19:26.173Z
Link: CVE-2025-59058

Updated: 2025-09-12T13:43:36.110Z

Status : Received
Published: 2025-09-12T14:15:41.773
Modified: 2025-09-12T14:15:41.773
Link: CVE-2025-59058

No data.

No data.