A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 09:28
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://access.redhat.com/errata/RHSA-2024:3657 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3658 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3659 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3660 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3661 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4400 - | |
References | () https://access.redhat.com/errata/RHSA-2024:4411 - | |
References | () https://access.redhat.com/security/cve/CVE-2024-3049 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2272082 - Issue Tracking |
13 Sep 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Jul 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Jun 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Jun 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Jun 2024, 17:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.2_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.8_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.0_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:* cpe:2.3:a:clusterlabs:booth:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* |
|
References | () https://access.redhat.com/errata/RHSA-2024:3657 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3658 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3659 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3660 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3661 - Third Party Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2024-3049 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2272082 - Issue Tracking | |
First Time |
Redhat enterprise Linux
Redhat enterprise Linux Server Update Services For Sap Solutions Redhat enterprise Linux For Power Little Endian Eus Clusterlabs Clusterlabs booth Redhat enterprise Linux Eus Redhat enterprise Linux For Ibm Z Systems Eus Redhat enterprise Linux For Arm 64 Redhat Redhat enterprise Linux For Ibm Z Systems |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
06 Jun 2024, 14:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Jun 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Jun 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-06 06:15
Updated : 2024-11-21 09:28
NVD link : CVE-2024-3049
Mitre link : CVE-2024-3049
CVE.ORG link : CVE-2024-3049
JSON object : View
Products Affected
redhat
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_for_arm_64
- enterprise_linux_server_update_services_for_sap_solutions
- enterprise_linux
- enterprise_linux_eus
clusterlabs
- booth
CWE
CWE-345
Insufficient Verification of Data Authenticity