CVE-2024-3049
Severity CVSS v4.0:
Pending analysis
Type:
CWE-345
Insufficient Verification of Data Authenticity
Publication date:
06/06/2024
Last modified:
02/10/2025
Description
A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:clusterlabs:booth:*:*:*:*:*:*:*:* | 1.1 (excluding) | |
| cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.8_aarch64:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.2_aarch64:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2_s390x:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://access.redhat.com/errata/RHSA-2024:3657
- https://access.redhat.com/errata/RHSA-2024:3658
- https://access.redhat.com/errata/RHSA-2024:3659
- https://access.redhat.com/errata/RHSA-2024:3660
- https://access.redhat.com/errata/RHSA-2024:3661
- https://access.redhat.com/errata/RHSA-2024:4400
- https://access.redhat.com/errata/RHSA-2024:4411
- https://access.redhat.com/security/cve/CVE-2024-3049
- https://bugzilla.redhat.com/show_bug.cgi?id=2272082
- https://github.com/ClusterLabs/booth/pull/142
- https://access.redhat.com/errata/RHSA-2024:3657
- https://access.redhat.com/errata/RHSA-2024:3658
- https://access.redhat.com/errata/RHSA-2024:3659
- https://access.redhat.com/errata/RHSA-2024:3660
- https://access.redhat.com/errata/RHSA-2024:3661
- https://access.redhat.com/errata/RHSA-2024:4400
- https://access.redhat.com/errata/RHSA-2024:4411
- https://access.redhat.com/security/cve/CVE-2024-3049
- https://bugzilla.redhat.com/show_bug.cgi?id=2272082
- https://lists.debian.org/debian-lts-announce/2024/09/msg00037.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERCFM3HXFJKLEMMWU3CZLPKH5LZAEDAN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPK5BHYOB7CFFRQAN55YV5LH44PWHMQD/



