A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 09:28
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://access.redhat.com/errata/RHSA-2024:3657 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3658 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3659 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3660 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3661 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4400 - | |
References | () https://access.redhat.com/errata/RHSA-2024:4411 - | |
References | () https://access.redhat.com/security/cve/CVE-2024-3049 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2272082 - Issue Tracking |
13 Sep 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Jul 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Jun 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Jun 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Jun 2024, 17:54
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat enterprise Linux Server Update Services For Sap Solutions
Redhat enterprise Linux Eus Clusterlabs booth Redhat Redhat enterprise Linux For Power Little Endian Eus Redhat enterprise Linux Redhat enterprise Linux For Arm 64 Redhat enterprise Linux For Ibm Z Systems Redhat enterprise Linux For Ibm Z Systems Eus Clusterlabs |
|
CPE | cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.0_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:clusterlabs:booth:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.2_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.8_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
References | () https://access.redhat.com/errata/RHSA-2024:3657 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3658 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3659 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3660 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3661 - Third Party Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2024-3049 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2272082 - Issue Tracking |
06 Jun 2024, 14:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Jun 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Jun 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-06 06:15
Updated : 2024-11-21 09:28
NVD link : CVE-2024-3049
Mitre link : CVE-2024-3049
CVE.ORG link : CVE-2024-3049
JSON object : View
Products Affected
redhat
- enterprise_linux
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_server_update_services_for_sap_solutions
- enterprise_linux_for_arm_64
- enterprise_linux_eus
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_for_power_little_endian_eus
clusterlabs
- booth
CWE
CWE-345
Insufficient Verification of Data Authenticity