CVE-2024-3049
NixOS vulnerability analysis and mitigation

Overview

CVE-2024-3049 affects Booth, a cluster ticket manager that bridges high availability clusters spanning multiple sites. The vulnerability was discovered in March 2024 and affects versions up to (excluding) 1.1. The flaw allows specially-crafted hash inputs to gcrymdgetalgodlen() to potentially compromise the system's security (NVD, Red Hat).

Technical details

The vulnerability occurs when an unknown or specially-crafted hash is passed to gcrymdgetalgodlen(), which returns 0. This returned value is then used for memcmp, potentially allowing an invalid HMAC to be accepted by the Booth server as valid. The vulnerability has a CVSS v3.1 base score of 5.9 (Medium) with vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N (Red Hat Bugzilla).

Impact

If exploited, this vulnerability could allow an attacker to bypass HMAC validation in the Booth server, potentially leading to unauthorized access or manipulation of cluster tickets that control resource authorization across geographically distributed clusters (Red Hat).

Mitigation and workarounds

Fixed versions have been released across multiple platforms. Red Hat has released updates for RHEL 8 and 9 versions through various security advisories. Debian has addressed the issue in version 1.0-237-gdd88847-2+deb11u2 for Debian 11 (Bullseye). Fedora has released version 1.2-1 for Fedora 40 and version 1.0-283.5.9d4029a.git.fc39 for Fedora 39 (Debian LTS, Fedora).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management