summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-parse
diff options
context:
space:
mode:
authorDivya Chellam <divya.chellam@windriver.com>2025-10-24 17:56:24 +0530
committerGyorgy Sarvari <skandigraun@gmail.com>2025-10-27 11:17:59 +0100
commit3c55e66f1fc7324c266324798a6c6aa94c5048d0 (patch)
tree44f30b20231090f9365f884c675d628235ea7f88 /meta-python/recipes-devtools/python/python3-parse
parent6306bae883db86f1bb1f79a8f672f00bc114a9be (diff)
downloadmeta-openembedded-3c55e66f1fc7324c266324798a6c6aa94c5048d0.tar.gz
mariadb: fix CVE-2025-30722
Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Client accessible data as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N). Reference: https://security-tracker.debian.org/tracker/CVE-2025-30722 Upstream-patch: https://github.com/MariaDB/server/commit/6aa860be27480db134a3c71065b9b47d15b72674 Signed-off-by: Divya Chellam <divya.chellam@windriver.com> Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-parse')
0 files changed, 0 insertions, 0 deletions