First published: Sun Feb 11 2024(Updated: )
In Rhonabwy through 1.1.13, HMAC signature verification uses a strcmp function that is vulnerable to side-channel attacks, because it stops the comparison when the first difference is spotted in the two signatures. (The fix uses gnutls_memcmp, which has constant-time execution.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rhonabwy Project | <=1.1.3 | |
Debian Linux | =11.0 | |
Debian Linux | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25714 has a high severity rating due to its potential exploitation through side-channel attacks.
To fix CVE-2024-25714, update to Rhonabwy version 1.1.14 or later, which implements constant-time comparison using gnutls_memcmp.
All versions of Rhonabwy up to and including 1.1.13 are affected by CVE-2024-25714.
CVE-2024-25714 allows attackers to exploit the strcmp function during HMAC signature verification, leading to potential information disclosure.
CVE-2024-25714 impacts Debian Linux versions 11.0 and 12.0 as it includes the affected Rhonabwy software.