CVE-2024-25714

In Rhonabwy through 1.1.13, HMAC signature verification uses a strcmp function that is vulnerable to side-channel attacks, because it stops the comparison when the first difference is spotted in the two signatures. (The fix uses gnutls_memcmp, which has constant-time execution.)
Configurations

Configuration 1 (hide)

cpe:2.3:a:rhonabwy_project:rhonabwy:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-02-11 03:15

Updated : 2024-11-21 09:01


NVD link : CVE-2024-25714

Mitre link : CVE-2024-25714

CVE.ORG link : CVE-2024-25714


JSON object : View

Products Affected

rhonabwy_project

  • rhonabwy

debian

  • debian_linux
CWE
CWE-203

Observable Discrepancy

CWE-1255

Comparison Logic is Vulnerable to Power Side-Channel Attacks