vulnerability
Rocky Linux: CVE-2025-13699: mariadb-devel-10.3 (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:L/AC:H/Au:N/C:C/I:C/A:C) | Jan 7, 2026 | Jan 8, 2026 | Jan 30, 2026 |
Severity
6
CVSS
(AV:L/AC:H/Au:N/C:C/I:C/A:C)
Published
Jan 7, 2026
Added
Jan 8, 2026
Modified
Jan 30, 2026
Description
MariaDB is a multi-user, multi-threaded SQL database server that is binary
Solutions
rocky-upgrade-asio-develrocky-upgrade-galerarocky-upgrade-galera-debuginforocky-upgrade-galera-debugsourcerocky-upgrade-judyrocky-upgrade-judy-debuginforocky-upgrade-judy-debugsourcerocky-upgrade-judy-develrocky-upgrade-mariadbrocky-upgrade-mariadb-backuprocky-upgrade-mariadb-backup-debuginforocky-upgrade-mariadb-commonrocky-upgrade-mariadb-debuginforocky-upgrade-mariadb-debugsourcerocky-upgrade-mariadb-develrocky-upgrade-mariadb-embeddedrocky-upgrade-mariadb-embedded-debuginforocky-upgrade-mariadb-embedded-develrocky-upgrade-mariadb-errmsgrocky-upgrade-mariadb-gssapi-serverrocky-upgrade-mariadb-gssapi-server-debuginforocky-upgrade-mariadb-oqgraph-enginerocky-upgrade-mariadb-oqgraph-engine-debuginforocky-upgrade-mariadb-pamrocky-upgrade-mariadb-pam-debuginforocky-upgrade-mariadb-serverrocky-upgrade-mariadb-server-debuginforocky-upgrade-mariadb-server-galerarocky-upgrade-mariadb-server-utilsrocky-upgrade-mariadb-server-utils-debuginforocky-upgrade-mariadb-testrocky-upgrade-mariadb-test-debuginfo
References
- CVE-2025-13699
- https://attackerkb.com/topics/CVE-2025-13699
- CWE-22
- URL-https://errata.rockylinux.org/RLSA-2026:0136
- URL-https://errata.rockylinux.org/RLSA-2026:0137
- URL-https://errata.rockylinux.org/RLSA-2026:0225
- URL-https://errata.rockylinux.org/RLSA-2026:0232
- URL-https://errata.rockylinux.org/RLSA-2026:0233
- URL-https://errata.rockylinux.org/RLSA-2026:0247
- URL-https://errata.rockylinux.org/RLSA-2026:0698
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.