A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "38"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "9.0"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.6"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.8"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "9.0"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "9.2"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.0_aarch64"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "9.0_aarch64"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.8_aarch64"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.0_s390x"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "9.0_s390x"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2_s390x:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "9.2_s390x"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.6_s390x"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.8_s390x"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "9.2_s390x"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.0_ppc64le"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "9.0_ppc64le"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.8_ppc64le"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "9.2_ppc64le"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.4"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.6"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "9.2"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.4"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.6"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.8"
}
]
}
]
}{
"cpe": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "10.3.36"
},
{
"introduced": "10.7.0"
},
{
"fixed": "10.7.5"
},
{
"introduced": "10.8.0"
},
{
"fixed": "10.8.4"
},
{
"introduced": "10.4.0"
},
{
"fixed": "10.4.26"
},
{
"introduced": "10.5.0"
},
{
"fixed": "10.5.17"
},
{
"introduced": "10.6.0"
},
{
"fixed": "10.6.9"
}
]
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-5157.json"
"2026-04-12T08:24:17Z"
[
{
"signature_type": "Function",
"id": "CVE-2023-5157-bab28f5d",
"signature_version": "v1",
"deprecated": false,
"digest": {
"function_hash": "96567548985656349046472553596954460768",
"length": 1094.0
},
"target": {
"file": "sql/strfunc.cc",
"function": "find_set"
},
"source": "https://github.com/mariadb/server/commit/faddcf3c395da640b760c3f701f5bc1f3baae6c4"
},
{
"signature_type": "Line",
"id": "CVE-2023-5157-ee10862f",
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"271363707396860767418283350345897486504",
"120596951573328682502907908502941671745",
"115421961338400510566446524145876737974",
"64074615696916198601226435566349591945"
],
"threshold": 0.9
},
"target": {
"file": "sql/strfunc.cc"
},
"source": "https://github.com/mariadb/server/commit/faddcf3c395da640b760c3f701f5bc1f3baae6c4"
}
]