vulnerability

Alma Linux: CVE-2024-3596: Important: krb5 security update (Multiple Advisories)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
07/09/2024
Added
08/08/2024
Modified
04/15/2025

Description

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

Solution(s)

alma-upgrade-freeradiusalma-upgrade-freeradius-develalma-upgrade-freeradius-docalma-upgrade-freeradius-krb5alma-upgrade-freeradius-ldapalma-upgrade-freeradius-mysqlalma-upgrade-freeradius-perlalma-upgrade-freeradius-postgresqlalma-upgrade-freeradius-restalma-upgrade-freeradius-sqlitealma-upgrade-freeradius-unixodbcalma-upgrade-freeradius-utilsalma-upgrade-krb5-develalma-upgrade-krb5-libsalma-upgrade-krb5-pkinitalma-upgrade-krb5-serveralma-upgrade-krb5-server-ldapalma-upgrade-krb5-workstationalma-upgrade-libkadm5alma-upgrade-python3-freeradius
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.