vulnerability
Amazon Linux 2023: CVE-2025-30722: Medium priority package update for mariadb1011 (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:S/C:C/I:P/A:N) | Apr 15, 2025 | Jun 11, 2025 | Jul 11, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:S/C:C/I:P/A:N)
Published
Apr 15, 2025
Added
Jun 11, 2025
Modified
Jul 11, 2025
Description
Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Client accessible data as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N).
Solutions
amazon-linux-2023-upgrade-mariadb1011amazon-linux-2023-upgrade-mariadb1011-backupamazon-linux-2023-upgrade-mariadb1011-backup-debuginfoamazon-linux-2023-upgrade-mariadb1011-client-utilsamazon-linux-2023-upgrade-mariadb1011-commonamazon-linux-2023-upgrade-mariadb1011-connect-engineamazon-linux-2023-upgrade-mariadb1011-connect-engine-debuginfoamazon-linux-2023-upgrade-mariadb1011-cracklib-password-checkamazon-linux-2023-upgrade-mariadb1011-cracklib-password-check-debuginfoamazon-linux-2023-upgrade-mariadb1011-debuginfoamazon-linux-2023-upgrade-mariadb1011-debugsourceamazon-linux-2023-upgrade-mariadb1011-develamazon-linux-2023-upgrade-mariadb1011-errmsgamazon-linux-2023-upgrade-mariadb1011-gssapi-serveramazon-linux-2023-upgrade-mariadb1011-gssapi-server-debuginfoamazon-linux-2023-upgrade-mariadb1011-oqgraph-engineamazon-linux-2023-upgrade-mariadb1011-oqgraph-engine-debuginfoamazon-linux-2023-upgrade-mariadb1011-pamamazon-linux-2023-upgrade-mariadb1011-pam-debuginfoamazon-linux-2023-upgrade-mariadb1011-rocksdb-engineamazon-linux-2023-upgrade-mariadb1011-rocksdb-engine-debuginfoamazon-linux-2023-upgrade-mariadb1011-serveramazon-linux-2023-upgrade-mariadb1011-server-debuginfoamazon-linux-2023-upgrade-mariadb1011-server-utilsamazon-linux-2023-upgrade-mariadb1011-server-utils-debuginfoamazon-linux-2023-upgrade-mariadb1011-sphinx-engineamazon-linux-2023-upgrade-mariadb1011-sphinx-engine-debuginfoamazon-linux-2023-upgrade-mariadb1011-testamazon-linux-2023-upgrade-mariadb1011-test-debuginfoamazon-linux-2023-upgrade-mariadb105amazon-linux-2023-upgrade-mariadb105-backupamazon-linux-2023-upgrade-mariadb105-backup-debuginfoamazon-linux-2023-upgrade-mariadb105-commonamazon-linux-2023-upgrade-mariadb105-connect-engineamazon-linux-2023-upgrade-mariadb105-connect-engine-debuginfoamazon-linux-2023-upgrade-mariadb105-cracklib-password-checkamazon-linux-2023-upgrade-mariadb105-cracklib-password-check-debuginfoamazon-linux-2023-upgrade-mariadb105-debuginfoamazon-linux-2023-upgrade-mariadb105-debugsourceamazon-linux-2023-upgrade-mariadb105-develamazon-linux-2023-upgrade-mariadb105-errmsgamazon-linux-2023-upgrade-mariadb105-gssapi-serveramazon-linux-2023-upgrade-mariadb105-gssapi-server-debuginfoamazon-linux-2023-upgrade-mariadb105-oqgraph-engineamazon-linux-2023-upgrade-mariadb105-oqgraph-engine-debuginfoamazon-linux-2023-upgrade-mariadb105-pamamazon-linux-2023-upgrade-mariadb105-pam-debuginfoamazon-linux-2023-upgrade-mariadb105-rocksdb-engineamazon-linux-2023-upgrade-mariadb105-rocksdb-engine-debuginfoamazon-linux-2023-upgrade-mariadb105-serveramazon-linux-2023-upgrade-mariadb105-server-debuginfoamazon-linux-2023-upgrade-mariadb105-server-utilsamazon-linux-2023-upgrade-mariadb105-server-utils-debuginfoamazon-linux-2023-upgrade-mariadb105-sphinx-engineamazon-linux-2023-upgrade-mariadb105-sphinx-engine-debuginfoamazon-linux-2023-upgrade-mariadb105-testamazon-linux-2023-upgrade-mariadb105-test-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.