BDU:2024-05602
Vulnerability from fstec - Published: 06.06.2024
VLAI Severity ?
Title
Уязвимость функции gcry_md_get_algo_dlen() программного обеспечения управления и мониторинга кластеров высокой доступности ClusterLabs Booth, позволяющая нарушителю принять недопустимый HMAC
Description
Уязвимость функции gcry_md_get_algo_dlen() программного обеспечения управления и мониторинга кластеров высокой доступности ClusterLabs Booth связана с недостаточной проверкой подлинности данных. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, принять недопустимый HMAC
Severity ?
Vendor
Red Hat Inc., Fedora Project, ClusterLabs
Software Name
Red Hat Enterprise Linux, Fedora, Booth, Red Hat Enterprise Linux EUS, Red Hat Enterprise Linux for IBM zsystems, Red Hat Enterprise Linux for ARM64, Red Hat Enterprise Linux for Power Little Endian EUS, Red Hat Enterprise Linux Server Update Services for SAP Solutions
Software Version
7 (Red Hat Enterprise Linux), 8 (Red Hat Enterprise Linux), 9 (Red Hat Enterprise Linux), 39 (Fedora), 40 (Fedora), до 1.1 (Booth), 8.4 (Red Hat Enterprise Linux EUS), 8.8 (Red Hat Enterprise Linux EUS), 9.2 (Red Hat Enterprise Linux EUS), 8.0 (Red Hat Enterprise Linux for IBM zsystems), 9.2 (Red Hat Enterprise Linux for IBM zsystems), 9.4 (Red Hat Enterprise Linux for IBM zsystems), 8.0 (Red Hat Enterprise Linux for ARM64), 8.8 (Red Hat Enterprise Linux for ARM64), 9.2 (Red Hat Enterprise Linux for ARM64), 9.4 (Red Hat Enterprise Linux for ARM64), 8.0 (Red Hat Enterprise Linux for Power Little Endian EUS), 8.4 (Red Hat Enterprise Linux for Power Little Endian EUS), 8.8 (Red Hat Enterprise Linux for Power Little Endian EUS), 9.2 (Red Hat Enterprise Linux for Power Little Endian EUS), 9.4 (Red Hat Enterprise Linux for Power Little Endian EUS), 8.4 (Red Hat Enterprise Linux Server Update Services for SAP Solutions)
Possible Mitigations
Использование рекомендаций:
Для ClusterLabs Booth:
https://github.com/ClusterLabs/booth/pull/142
https://github.com/ClusterLabs/booth/commit/98b4284d1701f2efec278b51f151314148bfe70e
https://github.com/ClusterLabs/booth/commit/43eaf0e82b1475a6a5322881cbd8260b6c3f5ef8
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/errata/RHSA-2024:3657
https://access.redhat.com/errata/RHSA-2024:3658
https://access.redhat.com/errata/RHSA-2024:3659
https://access.redhat.com/errata/RHSA-2024:3660
https://access.redhat.com/errata/RHSA-2024:3661
https://access.redhat.com/security/cve/CVE-2024-3049
https://bugzilla.redhat.com/show_bug.cgi?id=2272082
Для Fedora:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERCFM3HXFJKLEMMWU3CZLPKH5LZAEDAN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPK5BHYOB7CFFRQAN55YV5LH44PWHMQD/
Reference
https://access.redhat.com/errata/RHSA-2024:3657
https://access.redhat.com/errata/RHSA-2024:3658
https://access.redhat.com/errata/RHSA-2024:3659
https://access.redhat.com/errata/RHSA-2024:3660
https://access.redhat.com/errata/RHSA-2024:3661
https://access.redhat.com/security/cve/CVE-2024-3049
https://bugzilla.redhat.com/show_bug.cgi?id=2272082
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERCFM3HXFJKLEMMWU3CZLPKH5LZAEDAN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPK5BHYOB7CFFRQAN55YV5LH44PWHMQD/
https://github.com/ClusterLabs/booth/pull/142
https://github.com/ClusterLabs/booth/commit/98b4284d1701f2efec278b51f151314148bfe70e
https://github.com/ClusterLabs/booth/commit/43eaf0e82b1475a6a5322881cbd8260b6c3f5ef8
CWE
CWE-345
{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:N/I:C/A:N",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., Fedora Project, ClusterLabs",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7 (Red Hat Enterprise Linux), 8 (Red Hat Enterprise Linux), 9 (Red Hat Enterprise Linux), 39 (Fedora), 40 (Fedora), \u0434\u043e 1.1 (Booth), 8.4 (Red Hat Enterprise Linux EUS), 8.8 (Red Hat Enterprise Linux EUS), 9.2 (Red Hat Enterprise Linux EUS), 8.0 (Red Hat Enterprise Linux for IBM zsystems), 9.2 (Red Hat Enterprise Linux for IBM zsystems), 9.4 (Red Hat Enterprise Linux for IBM zsystems), 8.0 (Red Hat Enterprise Linux for ARM64), 8.8 (Red Hat Enterprise Linux for ARM64), 9.2 (Red Hat Enterprise Linux for ARM64), 9.4 (Red Hat Enterprise Linux for ARM64), 8.0 (Red Hat Enterprise Linux for Power Little Endian EUS), 8.4 (Red Hat Enterprise Linux for Power Little Endian EUS), 8.8 (Red Hat Enterprise Linux for Power Little Endian EUS), 9.2 (Red Hat Enterprise Linux for Power Little Endian EUS), 9.4 (Red Hat Enterprise Linux for Power Little Endian EUS), 8.4 (Red Hat Enterprise Linux Server Update Services for SAP Solutions)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f ClusterLabs Booth:\nhttps://github.com/ClusterLabs/booth/pull/142\nhttps://github.com/ClusterLabs/booth/commit/98b4284d1701f2efec278b51f151314148bfe70e\nhttps://github.com/ClusterLabs/booth/commit/43eaf0e82b1475a6a5322881cbd8260b6c3f5ef8 \n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/errata/RHSA-2024:3657\nhttps://access.redhat.com/errata/RHSA-2024:3658\nhttps://access.redhat.com/errata/RHSA-2024:3659\nhttps://access.redhat.com/errata/RHSA-2024:3660 \nhttps://access.redhat.com/errata/RHSA-2024:3661\nhttps://access.redhat.com/security/cve/CVE-2024-3049\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2272082\n\n\u0414\u043b\u044f Fedora:\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERCFM3HXFJKLEMMWU3CZLPKH5LZAEDAN/\t\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPK5BHYOB7CFFRQAN55YV5LH44PWHMQD/",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "06.06.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.07.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "23.07.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-05602",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-3049",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Fedora, Booth, Red Hat Enterprise Linux EUS, Red Hat Enterprise Linux for IBM zsystems, Red Hat Enterprise Linux for ARM64, Red Hat Enterprise Linux for Power Little Endian EUS, Red Hat Enterprise Linux Server Update Services for SAP Solutions",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 7 , Red Hat Inc. Red Hat Enterprise Linux 8 , Red Hat Inc. Red Hat Enterprise Linux 9 , Fedora Project Fedora 39 , Fedora Project Fedora 40 , Red Hat Inc. Red Hat Enterprise Linux EUS 8.4 , Red Hat Inc. Red Hat Enterprise Linux EUS 8.8 , Red Hat Inc. Red Hat Enterprise Linux EUS 9.2 , Red Hat Inc. Red Hat Enterprise Linux for IBM zsystems 8.0 s390x, Red Hat Inc. Red Hat Enterprise Linux for IBM zsystems 9.2 s390x, Red Hat Inc. Red Hat Enterprise Linux for IBM zsystems 9.4 s390x, Red Hat Inc. Red Hat Enterprise Linux for ARM64 8.0 aarch64, Red Hat Inc. Red Hat Enterprise Linux for ARM64 8.8 aarch64, Red Hat Inc. Red Hat Enterprise Linux for ARM64 9.2 aarch64, Red Hat Inc. Red Hat Enterprise Linux for ARM64 9.4 aarch64, Red Hat Inc. Red Hat Enterprise Linux for Power Little Endian EUS 8.0 ppc64le, Red Hat Inc. Red Hat Enterprise Linux for Power Little Endian EUS 8.4 ppc64le, Red Hat Inc. Red Hat Enterprise Linux for Power Little Endian EUS 8.8 ppc64le, Red Hat Inc. Red Hat Enterprise Linux for Power Little Endian EUS 9.2 ppc64le, Red Hat Inc. Red Hat Enterprise Linux for Power Little Endian EUS 9.4 ppc64le, Red Hat Inc. Red Hat Enterprise Linux Server Update Services for SAP Solutions 8.4 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 gcry_md_get_algo_dlen() \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0430 \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u043e\u0432 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u0438 ClusterLabs Booth, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u0440\u0438\u043d\u044f\u0442\u044c \u043d\u0435\u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u044b\u0439 HMAC",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-345)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 gcry_md_get_algo_dlen() \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0430 \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u043e\u0432 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u0438 ClusterLabs Booth \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u0440\u0438\u043d\u044f\u0442\u044c \u043d\u0435\u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u044b\u0439 HMAC",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://access.redhat.com/errata/RHSA-2024:3657\nhttps://access.redhat.com/errata/RHSA-2024:3658\nhttps://access.redhat.com/errata/RHSA-2024:3659\nhttps://access.redhat.com/errata/RHSA-2024:3660 \nhttps://access.redhat.com/errata/RHSA-2024:3661\nhttps://access.redhat.com/security/cve/CVE-2024-3049\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2272082\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERCFM3HXFJKLEMMWU3CZLPKH5LZAEDAN/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPK5BHYOB7CFFRQAN55YV5LH44PWHMQD/\nhttps://github.com/ClusterLabs/booth/pull/142\nhttps://github.com/ClusterLabs/booth/commit/98b4284d1701f2efec278b51f151314148bfe70e\nhttps://github.com/ClusterLabs/booth/commit/43eaf0e82b1475a6a5322881cbd8260b6c3f5ef8",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-345",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,4)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,9)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…