Vulnerabilities > CVE-2024-3049
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
NONE Integrity impact
HIGH Availability impact
NONE Summary
A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.
Vulnerable Configurations
References
- https://access.redhat.com/errata/RHSA-2024:3657
- https://access.redhat.com/errata/RHSA-2024:3657
- https://access.redhat.com/errata/RHSA-2024:3658
- https://access.redhat.com/errata/RHSA-2024:3658
- https://access.redhat.com/errata/RHSA-2024:3659
- https://access.redhat.com/errata/RHSA-2024:3659
- https://access.redhat.com/errata/RHSA-2024:3660
- https://access.redhat.com/errata/RHSA-2024:3660
- https://access.redhat.com/errata/RHSA-2024:3661
- https://access.redhat.com/errata/RHSA-2024:3661
- https://access.redhat.com/errata/RHSA-2024:4400
- https://access.redhat.com/errata/RHSA-2024:4400
- https://access.redhat.com/errata/RHSA-2024:4411
- https://access.redhat.com/errata/RHSA-2024:4411
- https://access.redhat.com/security/cve/CVE-2024-3049
- https://access.redhat.com/security/cve/CVE-2024-3049
- https://bugzilla.redhat.com/show_bug.cgi?id=2272082
- https://bugzilla.redhat.com/show_bug.cgi?id=2272082
- https://lists.debian.org/debian-lts-announce/2024/09/msg00037.html
- https://lists.fedoraproject.org/archives/list/[email protected]/message/ERCFM3HXFJKLEMMWU3CZLPKH5LZAEDAN/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/KPK5BHYOB7CFFRQAN55YV5LH44PWHMQD/