In Rhonabwy through 1.1.13, HMAC signature verification uses a strcmp function that is vulnerable to side-channel attacks, because it stops the comparison when the first difference is spotted in the two signatures. (The fix uses gnutls_memcmp, which has constant-time execution.)
[
{
"source": "https://github.com/babelouest/rhonabwy/commit/f9fd9a1c77e48b514ebb3baf0360f87eef3d846e",
"signature_type": "Line",
"target": {
"file": "src/jws.c"
},
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2024-25714-23ffd6fe",
"digest": {
"threshold": 0.9,
"line_hashes": [
"25678724314584167124922264578611273783",
"302340085744516423769864362718533950541",
"72862635192435118447099462657051295522",
"66675507800103435278274018038663932903"
]
}
},
{
"source": "https://github.com/babelouest/rhonabwy/commit/f9fd9a1c77e48b514ebb3baf0360f87eef3d846e",
"signature_type": "Function",
"target": {
"function": "r_jws_verify_sig_hmac",
"file": "src/jws.c"
},
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2024-25714-cad07773",
"digest": {
"length": 317.0,
"function_hash": "148100475367004168817421199024207297199"
}
}
]