Debian Rhonabwy vulnerabilities

3 known vulnerabilities affecting debian/rhonabwy.

Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH2

Vulnerabilities

Page 1 of 1
CVE-2024-25714CRITICALCVSS 9.8fixed in rhonabwy 1.1.13-2 (trixie)2024
CVE-2024-25714 [CRITICAL] CVE-2024-25714: rhonabwy - In Rhonabwy through 1.1.13, HMAC signature verification uses a strcmp function t... In Rhonabwy through 1.1.13, HMAC signature verification uses a strcmp function that is vulnerable to side-channel attacks, because it stops the comparison when the first difference is spotted in the two signatures. (The fix uses gnutls_memcmp, which has constant-time execution.) Scope: local bookworm: open bullseye: open trixie: resolved (fixed in 1.1.13-2)
debian
CVE-2022-38493HIGHCVSS 7.5fixed in rhonabwy 1.1.7-1 (bookworm)2022
CVE-2022-38493 [HIGH] CVE-2022-38493: rhonabwy - Rhonabwy 0.9.99 through 1.1.x before 1.1.7 doesn't check the RSA private key len... Rhonabwy 0.9.99 through 1.1.x before 1.1.7 doesn't check the RSA private key length before RSA-OAEP decryption. This allows attackers to cause a Denial of Service via a crafted JWE (JSON Web Encryption) token. Scope: local bookworm: resolved (fixed in 1.1.7-1) bullseye: resolved trixie: resolved (fixed in 1.1.7-1)
debian
CVE-2022-32096HIGHCVSS 7.5fixed in rhonabwy 1.1.5-1 (bookworm)2022
CVE-2022-32096 [HIGH] CVE-2022-32096: rhonabwy - Rhonabwy before v1.1.5 was discovered to contain a buffer overflow via the compo... Rhonabwy before v1.1.5 was discovered to contain a buffer overflow via the component r_jwe_aesgcm_key_unwrap. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted JWE token. Scope: local bookworm: resolved (fixed in 1.1.5-1) bullseye: resolved (fixed in 0.9.13-3+deb11u2) trixie: resolved (fixed in 1.1.5-1)
debian