Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
clusterlabs booth vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2022-2553
The authfile directive in the booth config file is ignored, preventing use of authentication in communications from node to node. As a result, nodes that do not have the correct authentication key are not prevented from communicating with other nodes in the cluster.
Clusterlabs Booth
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Fedoraproject Fedora 35
Fedoraproject Fedora 36
5.9
CVSSv3
CVE-2024-3049
A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.
Clusterlabs Booth
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Eus 8.4
Redhat Enterprise Linux Server Update Services For Sap Solutions 8.4
Redhat Enterprise Linux 9.0
Redhat Enterprise Linux Eus 8.8
Redhat Enterprise Linux Eus 9.2
Redhat Enterprise Linux For Power Little Endian Eus 9.2 Ppc64le
Redhat Enterprise Linux For Power Little Endian Eus 8.8 Ppc64le
Redhat Enterprise Linux For Ibm Z Systems Eus 8.8 S390x
Redhat Enterprise Linux For Ibm Z Systems 8.0 S390x
Redhat Enterprise Linux For Arm 64 8.0 Aarch64
Redhat Enterprise Linux For Ibm Z Systems 9.2 S390x
Redhat Enterprise Linux For Arm 64 8.8 Aarch64
Redhat Enterprise Linux For Arm 64 9.4 Aarch64
Redhat Enterprise Linux For Power Little Endian Eus 9.4 Ppc64le
Redhat Enterprise Linux For Ibm Z Systems 9.4 S390x
Redhat Enterprise Linux For Arm 64 9.2 Aarch64
Redhat Enterprise Linux For Power Little Endian Eus 8.0 Ppc64le
Redhat Enterprise Linux For Power Little Endian Eus 8.4 Ppc64le
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-0044
client side
CVE-2021-47601
deserialization
CVE-2024-34994
encryption
CVE-2021-47609
CVE-2024-37079
CVE-2024-38608
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started