vulnerability

Amazon Linux AMI 2: CVE-2025-30722: Security patch for mariadb (ALASMARIADB10.5-2025-007)

Severity
5
CVSS
(AV:N/AC:H/Au:S/C:C/I:N/A:N)
Published
Apr 15, 2025
Added
Jun 11, 2025
Modified
Jun 30, 2025

Description

Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Client accessible data as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N).

Solutions

amazon-linux-ami-2-upgrade-mariadbamazon-linux-ami-2-upgrade-mariadb-backupamazon-linux-ami-2-upgrade-mariadb-commonamazon-linux-ami-2-upgrade-mariadb-configamazon-linux-ami-2-upgrade-mariadb-connect-engineamazon-linux-ami-2-upgrade-mariadb-cracklib-password-checkamazon-linux-ami-2-upgrade-mariadb-debuginfoamazon-linux-ami-2-upgrade-mariadb-develamazon-linux-ami-2-upgrade-mariadb-embeddedamazon-linux-ami-2-upgrade-mariadb-embedded-develamazon-linux-ami-2-upgrade-mariadb-errmsgamazon-linux-ami-2-upgrade-mariadb-gssapi-serveramazon-linux-ami-2-upgrade-mariadb-libsamazon-linux-ami-2-upgrade-mariadb-oqgraph-engineamazon-linux-ami-2-upgrade-mariadb-pamamazon-linux-ami-2-upgrade-mariadb-rocksdb-engineamazon-linux-ami-2-upgrade-mariadb-s3-engineamazon-linux-ami-2-upgrade-mariadb-serveramazon-linux-ami-2-upgrade-mariadb-server-galeraamazon-linux-ami-2-upgrade-mariadb-server-utilsamazon-linux-ami-2-upgrade-mariadb-sphinx-engineamazon-linux-ami-2-upgrade-mariadb-test
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.