CVE-2026-21713
EUVD-2026-1717430.03.2026, 20:16
A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided signatures, potentially leaking timing information proportional to the number of matching bytes. Under certain threat models where high-resolution timing measurements are possible, this behavior could be exploited as a timing oracle to infer HMAC values. Node.js already provides timing-safe comparison primitives used elsewhere in the codebase, indicating this is an oversight rather than an intentional design decision. This vulnerability affects **20.x, 22.x, 24.x, and 25.x**.Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.
Debian Releases
openSUSE / SLES Releases
openSUSE Product | |||||||
|---|---|---|---|---|---|---|---|
| nodejs20 |
| ||||||
| nodejs20-devel |
| ||||||
| nodejs20-docs |
| ||||||
| nodejs22 |
| ||||||
| nodejs22-devel |
| ||||||
| nodejs22-docs |
| ||||||
| nodejs24 |
| ||||||
| nodejs24-devel |
| ||||||
| nodejs24-docs |
| ||||||
| npm20 |
| ||||||
| npm22 |
| ||||||
| npm24 |
|