In Rhonabwy through 1.1.13, HMAC signature verification uses a strcmp function that is vulnerable to side-channel attacks, because it stops the comparison when the first difference is spotted in the two signatures. (The fix uses gnutls_memcmp, which has constant-time execution.)
{ "vanir_signatures": [ { "signature_version": "v1", "target": { "file": "src/jws.c" }, "signature_type": "Line", "source": "https://github.com/babelouest/rhonabwy/commit/f9fd9a1c77e48b514ebb3baf0360f87eef3d846e", "deprecated": false, "digest": { "line_hashes": [ "25678724314584167124922264578611273783", "302340085744516423769864362718533950541", "72862635192435118447099462657051295522", "66675507800103435278274018038663932903" ], "threshold": 0.9 }, "id": "CVE-2024-25714-23ffd6fe" }, { "signature_version": "v1", "target": { "function": "r_jws_verify_sig_hmac", "file": "src/jws.c" }, "signature_type": "Function", "source": "https://github.com/babelouest/rhonabwy/commit/f9fd9a1c77e48b514ebb3baf0360f87eef3d846e", "deprecated": false, "digest": { "length": 317.0, "function_hash": "148100475367004168817421199024207297199" }, "id": "CVE-2024-25714-cad07773" } ] }