CVE-2023-5157

Summary

CVECVE-2023-5157
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-09-27 15:19:00 UTC
Updated2023-12-04 12:15:00 UTC
DescriptionA vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.

Risk And Classification

Problem Types: NVD-CWE-noinfo

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Fedoraproject Fedora 38 All All All
Application Mariadb Mariadb All All All All
Application Redhat Codeready Linux Builder 9.0 All All All
Application Redhat Codeready Linux Builder For Arm64 9.0_aarch64 All All All
Application Redhat Codeready Linux Builder For Arm64 Eus 9.2_aarch64 All All All
Application Redhat Codeready Linux Builder For Ibm Z Systems 9.0_s390x All All All
Application Redhat Codeready Linux Builder For Ibm Z Systems Eus 9.2_s390x All All All
Application Redhat Codeready Linux Builder For Power Little Endian 9.0_ppc64le All All All
Application Redhat Codeready Linux Builder For Power Little Endian Eus 9.2_ppc64le All All All
Operating System Redhat Enterprise Linux 8.0 All All All
Operating System Redhat Enterprise Linux 9.0 All All All
Operating System Redhat Enterprise Linux Eus 8.8 All All All
Operating System Redhat Enterprise Linux Eus 9.2 All All All
Operating System Redhat Enterprise Linux For Arm 64 8.0_aarch64 All All All
Operating System Redhat Enterprise Linux For Arm 64 9.0_aarch64 All All All
Operating System Redhat Enterprise Linux For Arm 64 Eus 8.8_aarch64 All All All
Operating System Redhat Enterprise Linux For Ibm Z Systems 8.0_s390x All All All
Operating System Redhat Enterprise Linux For Ibm Z Systems 9.2_s390x All All All
Operating System Redhat Enterprise Linux For Ibm Z Systems Eus 8.8_s390x All All All
Operating System Redhat Enterprise Linux For Ibm Z Systems Eus 9.2_s390x All All All
Operating System Redhat Enterprise Linux For Power Little Endian 8.0_ppc64le All All All
Operating System Redhat Enterprise Linux For Power Little Endian 9.0_ppc64le All All All
Operating System Redhat Enterprise Linux For Power Little Endian Eus 8.8_ppc64le All All All
Operating System Redhat Enterprise Linux For Power Little Endian Eus 9.2_ppc64le All All All
Operating System Redhat Enterprise Linux Server Aus 9.2 All All All
Operating System Redhat Enterprise Linux Server Tus 8.8 All All All

References

ReferenceSourceLinkTags
Red Hat MISC access.redhat.com
Red Hat access.redhat.com
Red Hat access.redhat.com
cve-details MISC access.redhat.com
Red Hat MISC access.redhat.com
2240246 – (CVE-2023-5157) CVE-2023-5157 mariadb: node crashes with Transport endpoint is not connected mysqld got signal 6 MISC bugzilla.redhat.com
Red Hat access.redhat.com
RHSA-2023:7633 access.redhat.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 160981 Oracle Enterprise Linux Security Update for mariadb:10.5 (ELSA-2023-5683)
  • 160997 Oracle Enterprise Linux Security Update for galera and mariadb (ELSA-2023-5684)
  • 242160 Red Hat Update for mariadb:10.5 (RHSA-2023:5683)
  • 242162 Red Hat Update for galera and mariadb (RHSA-2023:5684)
  • 242346 Red Hat Update for mariadb:10.5 (RHSA-2023:6822)
  • 242349 Red Hat Update for mariadb:10.5 (RHSA-2023:6821)
  • 242404 Red Hat Update for galera and mariadb (RHSA-2023:6883)
  • 242541 Red Hat Update for rh-mariadb105-galera and rh-mariadb105-mariadb (RHSA-2023:7633)
  • 378963 Alibaba Cloud Linux Security Update for mariadb:10.5 (ALINUX3-SA-2023:0128)
  • 941292 AlmaLinux Security Update for mariadb:10.5 (ALSA-2023:5683)
  • 941294 AlmaLinux Security Update for galera and mariadb (ALSA-2023:5684)
  • 961045 Rocky Linux Security Update for mariadb:10.5 (RLSA-2023:5683)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report