clusterlabs CVE Vulnerabilities & Metrics

Focus on clusterlabs vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About clusterlabs Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with clusterlabs. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total clusterlabs CVEs: 26
Earliest CVE date: 23 Nov 2013, 11:55 UTC
Latest CVE date: 06 Jun 2024, 06:15 UTC

Latest CVE reference: CVE-2024-3049

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -50.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -50.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical clusterlabs CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.19

Max CVSS: 10.0

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 9
4.0-6.9 13
7.0-8.9 3
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS clusterlabs CVEs

These are the five CVEs with the highest CVSS scores for clusterlabs, sorted by severity first and recency.

All CVEs for clusterlabs

CVE-2024-3049 clusterlabs vulnerability CVSS: 0 06 Jun 2024, 06:15 UTC

A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.

CVE-2023-39976 clusterlabs vulnerability CVSS: 0 08 Aug 2023, 06:15 UTC

log_blackbox.c in libqb before 2.0.8 allows a buffer overflow via long log messages because the header size is not considered.

CVE-2023-2319 clusterlabs vulnerability CVSS: 0 17 May 2023, 23:15 UTC

It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1 via erratum RHSA-2023:1591. The CVE-2023-2319 was assigned to that Red Hat specific security regression in Red Hat Enterprise Linux 9.2.

CVE-2022-2735 clusterlabs vulnerability CVSS: 0 06 Sep 2022, 18:15 UTC

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

CVE-2021-3020 clusterlabs vulnerability CVSS: 0 26 Aug 2022, 00:15 UTC

An issue was discovered in ClusterLabs Hawk (aka HA Web Konsole) through 2.3.0-15. It ships the binary hawk_invoke (built from tools/hawk_invoke.c), intended to be used as a setuid program. This allows the hacluster user to invoke certain commands as root (with an attempt to limit this to safe combinations). This user is able to execute an interactive "shell" that isn't limited to the commands specified in hawk_invoke, allowing escalation to root.

CVE-2022-2553 clusterlabs vulnerability CVSS: 0 28 Jul 2022, 15:15 UTC

The authfile directive in the booth config file is ignored, preventing use of authentication in communications from node to node. As a result, nodes that do not have the correct authentication key are not prevented from communicating with other nodes in the cluster.

CVE-2022-1049 clusterlabs vulnerability CVSS: 6.5 25 Mar 2022, 19:15 UTC

A flaw was found in the Pacemaker configuration tool (pcs). The pcs daemon was allowing expired accounts, and accounts with expired passwords to login when using PAM authentication. Therefore, unprivileged expired accounts that have been denied access could still login.

CVE-2010-2496 clusterlabs vulnerability CVSS: 2.1 18 Oct 2021, 13:15 UTC

stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.

CVE-2020-35459 clusterlabs vulnerability CVSS: 7.2 12 Jan 2021, 15:15 UTC

An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call "crm history" (when "crm" is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges.

CVE-2020-35458 clusterlabs vulnerability CVSS: 10.0 12 Jan 2021, 15:15 UTC

An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser.

CVE-2020-25654 clusterlabs vulnerability CVSS: 9.0 24 Nov 2020, 20:15 UTC

An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.

CVE-2014-0104 clusterlabs vulnerability CVSS: 4.3 02 Jan 2020, 17:15 UTC

In fence-agents before 4.0.17 does not verify remote SSL certificates in the fence_cisco_ucs.py script which can potentially allow for man-in-the-middle attackers to spoof SSL servers via arbitrary SSL certificates.

CVE-2011-5271 clusterlabs vulnerability CVSS: 3.3 12 Nov 2019, 14:15 UTC

Pacemaker before 1.1.6 configure script creates temporary files insecurely

CVE-2019-10153 clusterlabs vulnerability CVSS: 4.0 30 Jul 2019, 23:15 UTC

A flaw was discovered in fence-agents, prior to version 4.3.4, where using non-ASCII characters in a guest VM's comment or other fields would cause fence_rhevm to exit with an exception. In cluster environments, this could lead to preventing automated recovery or otherwise denying service to clusters of which that VM is a member.

CVE-2019-12779 clusterlabs vulnerability CVSS: 6.6 07 Jun 2019, 20:29 UTC

libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.

CVE-2019-3885 clusterlabs vulnerability CVSS: 5.0 18 Apr 2019, 18:29 UTC

A use-after-free flaw was found in pacemaker up to and including version 2.0.1 which could result in certain sensitive information to be leaked via the system logs.

CVE-2018-16878 clusterlabs vulnerability CVSS: 2.1 18 Apr 2019, 18:29 UTC

A flaw was found in pacemaker up to and including version 2.0.1. An insufficient verification inflicted preference of uncontrolled processes can lead to DoS

CVE-2018-16877 clusterlabs vulnerability CVSS: 4.6 18 Apr 2019, 18:29 UTC

A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.

CVE-2016-7035 clusterlabs vulnerability CVSS: 7.2 10 Sep 2018, 16:29 UTC

An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.

CVE-2018-1079 clusterlabs vulnerability CVSS: 4.0 12 Apr 2018, 17:29 UTC

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVE-2018-1086 clusterlabs vulnerability CVSS: 5.0 12 Apr 2018, 16:29 UTC

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVE-2017-2661 clusterlabs vulnerability CVSS: 4.3 12 Mar 2018, 15:29 UTC

ClusterLabs pcs before version 0.9.157 is vulnerable to a cross-site scripting vulnerability due to improper validation of Node name field when creating new cluster or adding existing cluster.

CVE-2016-0721 clusterlabs vulnerability CVSS: 4.3 21 Apr 2017, 15:59 UTC

Session fixation vulnerability in pcsd in pcs before 0.9.157.

CVE-2016-0720 clusterlabs vulnerability CVSS: 6.8 21 Apr 2017, 15:59 UTC

Cross-site request forgery (CSRF) vulnerability in pcsd web UI in pcs before 0.9.149.

CVE-2016-7797 clusterlabs vulnerability CVSS: 5.0 24 Mar 2017, 15:59 UTC

Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.

CVE-2015-1867 clusterlabs vulnerability CVSS: 7.5 12 Aug 2015, 14:59 UTC

Pacemaker before 1.1.13 does not properly evaluate added nodes, which allows remote read-only users to gain privileges via an acl command.

CVE-2013-0281 clusterlabs vulnerability CVSS: 4.3 23 Nov 2013, 11:55 UTC

Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote attackers to cause a denial of service (connection blocking).