7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @anthonyroussel Activity log
- Created automatic suggestion
- @anthonyroussel removed package mariadb-connector-java
Mariadb: node crashes with transport endpoint is not connected mysqld got signal 6
A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.
References
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-5157 x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-5157 x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-5157 x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-5157 x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-5157 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-5157 x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-5157 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-5157 x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-5157 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-5157 x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-5157 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-5157 x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-5157 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-5157 x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-5157 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-5157 x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-5157 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-5157 x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT
- RHBZ#2240246 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-5157 x_transferred x_refsource_REDHAT vdb-entry
- RHSA-2023:5259 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-5157 x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-5157 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2023:5259 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-5157 x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT
- RHSA-2023:5683 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:5684 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6821 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6822 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:6883 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2023:7633 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-5157 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2240246 issue-tracking x_refsource_REDHAT x_transferred
Affected products
- *
- ==10.8.4
- ==10.7.5
- ==10.6.9
- ==10.5.17
- ==10.3.36
- *
- ==10.4.26
- *
- *
- *
- *
Matching in nixpkgs
pkgs.mariadb_106
Enhanced, drop-in replacement for MySQL
-
nixos-unstable -
- nixpkgs-unstable 10.6.23
pkgs.mariadb_114
Enhanced, drop-in replacement for MySQL
-
nixos-unstable -
- nixpkgs-unstable 11.4.8
pkgs.mariadb_118
Enhanced, drop-in replacement for MySQL
-
nixos-unstable -
- nixpkgs-unstable 11.8.3
pkgs.mariadb_1011
Enhanced, drop-in replacement for MySQL
-
nixos-unstable -
- nixpkgs-unstable 10.11.14
pkgs.mysql-client
Enhanced, drop-in replacement for MySQL
-
nixos-unstable -
- nixpkgs-unstable 10.11.14
pkgs.mariadb-client
Enhanced, drop-in replacement for MySQL
-
nixos-unstable -
- nixpkgs-unstable 10.11.14
pkgs.mariadb-galera
Galera 3 wsrep provider library
-
nixos-unstable -
- nixpkgs-unstable 26.4.23
pkgs.libmysqlclient_3_1
Client library that can be used to connect to MySQL or MariaDB
-
nixos-unstable -
- nixpkgs-unstable 3.1.21
pkgs.libmysqlclient_3_2
Client library that can be used to connect to MySQL or MariaDB
-
nixos-unstable -
- nixpkgs-unstable 3.2.7
pkgs.libmysqlclient_3_3
Client library that can be used to connect to MySQL or MariaDB
-
nixos-unstable -
- nixpkgs-unstable 3.3.5
pkgs.mariadb-connector-c_3_1
Client library that can be used to connect to MySQL or MariaDB
-
nixos-unstable -
- nixpkgs-unstable 3.1.21
pkgs.mariadb-connector-c_3_2
Client library that can be used to connect to MySQL or MariaDB
-
nixos-unstable -
- nixpkgs-unstable 3.2.7
pkgs.mariadb-connector-c_3_3
Client library that can be used to connect to MySQL or MariaDB
-
nixos-unstable -
- nixpkgs-unstable 3.3.5
pkgs.unixODBCDrivers.mariadb
MariaDB ODBC database driver
-
nixos-unstable -
- nixpkgs-unstable 3.1.20
pkgs.python312Packages.mariadb
MariaDB Connector/Python
-
nixos-unstable -
- nixpkgs-unstable 1.1.13
pkgs.python313Packages.mariadb
MariaDB Connector/Python
-
nixos-unstable -
- nixpkgs-unstable 1.1.13
Ignored packages (1)
pkgs.mariadb-connector-java
MariaDB Connector/J is used to connect applications developed in Java to MariaDB and MySQL databases
-
nixos-unstable -
- nixpkgs-unstable 3.5.5
Package maintainers
-
@Conni2461 Simon Hauser <simon-hauser@outlook.com>
-
@dasJ Janne Heß <janne@hess.ooo>
-
@thoughtpolice Austin Seipp <aseipp@pobox.com>
-
@helsinki-Jo Joachim Ernst <joachim.ernst@helsinki-systems.de>
-
@Izorkin Yurii Izorkin <Izorkin@gmail.com>
-
@globin Robin Gloster <mail@glob.in>