Clusterlabs Clusterlabs

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Clusterlabs product.

RSS Feeds for Clusterlabs security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Clusterlabs products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Clusterlabs Sorted by Most Security Vulnerabilities since 2018

Clusterlabs Pacemaker6 vulnerabilities

Clusterlabs Pcs5 vulnerabilities

Clusterlabs Booth2 vulnerabilities

Clusterlabs Libqb2 vulnerabilities

Clusterlabs Cluster Glue1 vulnerability

Clusterlabs Fence Agents1 vulnerability

Clusterlabs Hawk1 vulnerability

By the Year

In 2025 there have been 0 vulnerabilities in Clusterlabs. Last year, in 2024 Clusterlabs had 1 security vulnerability published. Right now, Clusterlabs is on track to have less security vulnerabilities in 2025 than it did last year.




Year Vulnerabilities Average Score
2025 0 0.00
2024 1 5.90
2023 2 9.80
2022 4 7.98
2021 1 5.50
2020 1 7.20
2019 5 6.58
2018 2 7.00

It may take a day or so for new Clusterlabs vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Clusterlabs Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2024-3049 Jun 06, 2024
Booth Ticket Manager Allows Invalid HMAC Via Hash Injection A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.
Booth
CVE-2023-39976 Aug 08, 2023
log_blackbox.c in libqb before 2.0.8 log_blackbox.c in libqb before 2.0.8 allows a buffer overflow via long log messages because the header size is not considered.
Libqb
CVE-2023-2319 May 17, 2023
It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1 It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1 via erratum RHSA-2023:1591. The CVE-2023-2319 was assigned to that Red Hat specific security regression in Red Hat Enterprise Linux 9.2.
Pcs
CVE-2022-2735 Sep 06, 2022
A vulnerability was found in the PCS project A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.
Pcs
CVE-2021-3020 Aug 26, 2022
An issue was discovered in ClusterLabs Hawk (aka HA Web Konsole) through 2.3.0-15 An issue was discovered in ClusterLabs Hawk (aka HA Web Konsole) through 2.3.0-15. It ships the binary hawk_invoke (built from tools/hawk_invoke.c), intended to be used as a setuid program. This allows the hacluster user to invoke certain commands as root (with an attempt to limit this to safe combinations). This user is able to execute an interactive "shell" that isn't limited to the commands specified in hawk_invoke, allowing escalation to root.
Hawk
CVE-2022-2553 Jul 28, 2022
The authfile directive in the booth config file is ignored, preventing use of authentication in communications from node to node The authfile directive in the booth config file is ignored, preventing use of authentication in communications from node to node. As a result, nodes that do not have the correct authentication key are not prevented from communicating with other nodes in the cluster.
Booth
CVE-2022-1049 Mar 25, 2022
A flaw was found in the Pacemaker configuration tool (pcs) A flaw was found in the Pacemaker configuration tool (pcs). The pcs daemon was allowing expired accounts, and accounts with expired passwords to login when using PAM authentication. Therefore, unprivileged expired accounts that have been denied access could still login.
Pcs
CVE-2010-2496 Oct 18, 2021
stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.
Cluster Glue
Pacemaker
CVE-2020-25654 Nov 24, 2020
An ACL bypass flaw was found in pacemaker An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.
Pacemaker
CVE-2019-10153 Jul 30, 2019
A flaw was discovered in fence-agents, prior to version 4.3.4, where using non-ASCII characters in a guest VM's comment or other fields A flaw was discovered in fence-agents, prior to version 4.3.4, where using non-ASCII characters in a guest VM's comment or other fields would cause fence_rhevm to exit with an exception. In cluster environments, this could lead to preventing automated recovery or otherwise denying service to clusters of which that VM is a member.
Fence Agents
CVE-2019-12779 Jun 07, 2019
libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
Libqb
CVE-2018-16878 Apr 18, 2019
A flaw was found in pacemaker up to and including version 2.0.1 A flaw was found in pacemaker up to and including version 2.0.1. An insufficient verification inflicted preference of uncontrolled processes can lead to DoS
Pacemaker
CVE-2018-16877 Apr 18, 2019
A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0 A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.
Pacemaker
CVE-2019-3885 Apr 18, 2019
A use-after-free flaw was found in pacemaker up to and including version 2.0.1 which could result in certain sensitive information to be leaked A use-after-free flaw was found in pacemaker up to and including version 2.0.1 which could result in certain sensitive information to be leaked via the system logs.
Pacemaker
CVE-2018-1079 Apr 12, 2018
pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.
Pacemaker Command Line Interface
CVE-2018-1086 Apr 12, 2018
pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.
Pacemaker Command Line Interface
CVE-2016-0720 Apr 21, 2017
Cross-site request forgery (CSRF) vulnerability in pcsd web UI in pcs before 0.9.149. Cross-site request forgery (CSRF) vulnerability in pcsd web UI in pcs before 0.9.149.
Pcs
CVE-2016-0721 Apr 21, 2017
Session fixation vulnerability in pcsd in pcs before 0.9.157. Session fixation vulnerability in pcsd in pcs before 0.9.157.
Pcs
CVE-2015-1867 Aug 12, 2015
Pacemaker before 1.1.13 does not properly evaluate added nodes, which Pacemaker before 1.1.13 does not properly evaluate added nodes, which allows remote read-only users to gain privileges via an acl command.
Pacemaker
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.