Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pacemaker vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-5189
Race condition in pcsd in PCS 0.9.139 and previous versions uses a global variable to validate usernames, which allows remote authenticated users to gain privileges by sending a command that is checked for security after another user is authenticated.
Pacemaker\\/corosync Configuration System Project Pacemaker\\/corosync Configuration System
NA
CVE-2015-5190
The pcsd web UI in PCS 0.9.139 and previous versions allows remote authenticated users to execute arbitrary commands via "escape characters" in a URL.
Pacemaker\\/corosync Configuration System Project Pacemaker\\/corosync Configuration System
7.2
CVSSv3
CVE-2020-25654
An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the confi...
Clusterlabs Pacemaker 2.0.5
Clusterlabs Pacemaker
Debian Debian Linux 9.0
5.5
CVSSv3
CVE-2011-5271
Pacemaker prior to 1.1.6 configure script creates temporary files insecurely
Clusterlabs Pacemaker
NA
CVE-2015-3983
The pcs daemon (pcsd) in PCS 0.9.137 and previous versions does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote malicious users to obtain potentially sensitive information via script access to this cookie. NOTE: this issue was SPLIT from CVE...
Fedora Pacemaker Configuration System
5.5
CVSSv3
CVE-2010-2496
stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local malicious users to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1...
Clusterlabs Cluster Glue
Clusterlabs Pacemaker
NA
CVE-2013-0281
Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote malicious users to cause a denial of service (connection blocking).
Redhat Enterprise Linux 6.0
Clusterlabs Pacemaker 1.1.10
7.5
CVSSv3
CVE-2019-3885
A use-after-free flaw was found in pacemaker up to and including version 2.0.1 which could result in certain sensitive information to be leaked via the system logs.
Clusterlabs Pacemaker
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Canonical Ubuntu Linux 19.04
Fedoraproject Fedora 30
5.5
CVSSv3
CVE-2018-16878
A flaw was found in pacemaker up to and including version 2.0.1. An insufficient verification inflicted preference of uncontrolled processes can lead to DoS
Clusterlabs Pacemaker
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Canonical Ubuntu Linux 19.04
Fedoraproject Fedora 28
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Debian Debian Linux 9.0
Opensuse Leap 42.3
Opensuse Leap 15.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Eus 8.1
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Aus 8.2
Redhat Enterprise Linux Tus 8.2
Redhat Enterprise Linux Aus 8.4
Redhat Enterprise Linux Tus 8.4
Redhat Enterprise Linux Eus 8.4
Redhat Enterprise Linux Eus 8.6
Redhat Enterprise Linux Tus 8.6
Redhat Enterprise Linux Aus 8.6
7.8
CVSSv3
CVE-2018-16877
A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.
Clusterlabs Pacemaker
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Canonical Ubuntu Linux 19.04
Fedoraproject Fedora 28
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Debian Debian Linux 9.0
Opensuse Leap 42.3
Opensuse Leap 15.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Eus 8.1
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Server Tus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Eus 8.4
Redhat Enterprise Linux Server Aus 8.4
Redhat Enterprise Linux Server Aus 8.6
Redhat Enterprise Linux Server Tus 8.6
Redhat Enterprise Linux Eus 8.6
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2021-35000
CVE-2024-4439
unauthorized
CVE-2024-0042
CVE-2024-31848
CVE-2023-40694
cache poisoning
CVE-2024-23707
firmware
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »