Galeracluster Galeracluster

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Galeracluster product.

RSS Feeds for Galeracluster security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Galeracluster products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Galeracluster Sorted by Most Security Vulnerabilities since 2018

Galeracluster Wsrep1 vulnerability

By the Year

In 2026 there have been 0 vulnerabilities in Galeracluster. Galeracluster did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 2 8.10

It may take a day or so for new Galeracluster vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Galeracluster Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2020-15180 May 27, 2021
A flaw was found in the mysql-wsrep component of mariadb A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.
Galera Cluster For Mysql
CVE-2021-27928 Mar 19, 2021
A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37 A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37, 10.3 before 10.3.28, 10.4 before 10.4.18, and 10.5 before 10.5.9; Percona Server through 2021-03-03; and the wsrep patch through 2021-03-03 for MySQL. An untrusted search path leads to eval injection, in which a database SUPER user can execute OS commands after modifying wsrep_provider and wsrep_notify_cmd. NOTE: this does not affect an Oracle product.
Wsrep
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.