CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “clusterlabs”

22 vulnerabilities found for “clusterlabs”

Page 1 of 2

CVE-2024-3049
MEDIUM5.9

A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.

clusterlabs / booth+20
Network
Published Jun 6, 2024
Page 1 of 2
CVE-2023-39976
CRITICAL9.8

log_blackbox.c in libqb before 2.0.8 allows a buffer overflow via long log messages because the header size is not considered.

clusterlabs / libqb
Network
Published Aug 8, 2023
CVE-2023-2319
CRITICAL9.8

It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1 via erratum RHSA-2023:1591. The CVE-2023-2319 was assigned to that Red Hat specific security regression in Red Hat Enterprise Linux 9.2.

clusterlabs / pcs+2
Network
Published May 17, 2023
CVE-2022-2735
HIGH7.8

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

clusterlabs / pcs+1
Local
Published Sep 6, 2022
CVE-2021-3020
HIGH8.8

An issue was discovered in ClusterLabs Hawk (aka HA Web Konsole) through 2.3.0-15. It ships the binary hawk_invoke (built from tools/hawk_invoke.c), intended to be used as a setuid program. This allows the hacluster user to invoke certain commands as root (with an attempt to limit this to safe combinations). This user is able to execute an interactive "shell" that isn't limited to the commands specified in hawk_invoke, allowing escalation to root.

clusterlabs / hawk
Network
Published Aug 26, 2022
CVE-2022-2553
MEDIUM6.5

The authfile directive in the booth config file is ignored, preventing use of authentication in communications from node to node. As a result, nodes that do not have the correct authentication key are not prevented from communicating with other nodes in the cluster.

clusterlabs / booth+4
Network
Published Jul 28, 2022
CVE-2022-1049
HIGH8.8

A flaw was found in the Pacemaker configuration tool (pcs). The pcs daemon was allowing expired accounts, and accounts with expired passwords to login when using PAM authentication. Therefore, unprivileged expired accounts that have been denied access could still login.

clusterlabs / pcs+2
Network
Published Mar 25, 2022
CVE-2010-2496
MEDIUM5.5

stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.

clusterlabs / cluster_glue+1
Local
Published Oct 18, 2021
CVE-2020-35459
HIGH7.8

An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call "crm history" (when "crm" is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges.

clusterlabs / crmsh+1
Local
Published Jan 12, 2021
CVE-2020-35458
CRITICAL9.8

An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser.

clusterlabs / hawk+1
Network
Published Jan 12, 2021
CVE-2020-25654
HIGH7.2

An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.

clusterlabs / pacemaker+3
Network
Published Nov 24, 2020
CVE-2011-5271
MEDIUM5.5

Pacemaker before 1.1.6 configure script creates temporary files insecurely

clusterlabs / pacemaker
Local
Published Nov 12, 2019
CVE-2019-12779
HIGH7.1

libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.

clusterlabs / libqb
Local
Published Jun 7, 2019
CVE-2018-16878
MEDIUM5.5

A flaw was found in pacemaker up to and including version 2.0.1. An insufficient verification inflicted preference of uncontrolled processes can lead to DoS

clusterlabs / pacemaker+21
Local
Published Apr 18, 2019
CVE-2019-3885
LOW3.3

A use-after-free flaw was found in pacemaker up to and including version 2.0.1 which could result in certain sensitive information to be leaked via the system logs.

clusterlabs / pacemaker+5
Local
Published Apr 18, 2019
CVE-2018-16877
HIGH7.8

A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.

clusterlabs / pacemaker+21
Local
Published Apr 18, 2019
CVE-2016-7035
HIGH8.8

An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.

clusterlabs / pacemaker+6
Local
Published Sep 10, 2018
CVE-2018-1079
HIGH8.7

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

clusterlabs / pacemaker_command_line_interface+3
Network
Published Apr 12, 2018
CVE-2018-1086
MEDIUM4.3

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

clusterlabs / pacemaker_command_line_interface+4
Network
Published Apr 12, 2018
CVE-2017-2661
MEDIUM6.1

ClusterLabs pcs before version 0.9.157 is vulnerable to a cross-site scripting vulnerability due to improper validation of Node name field when creating new cluster or adding existing cluster.

clusterlabs / pcs
Network
Published Mar 12, 2018