Language:
https://security.gentoo.org/glsa/202405-25
https://bugs.gentoo.org/show_bug.cgi?id=699874
https://bugs.gentoo.org/show_bug.cgi?id=822759
https://bugs.gentoo.org/show_bug.cgi?id=832490
https://bugs.gentoo.org/show_bug.cgi?id=838244
https://bugs.gentoo.org/show_bug.cgi?id=847526
Severity: High
ID: 195163
File Name: gentoo_GLSA-202405-25.nasl
Version: 1.1
Type: local
Family: Gentoo Local Security Checks
Published: 5/8/2024
Updated: 9/24/2025
Supported Sensors: Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2022-32081
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CVSS Score Source: CVE-2022-24052
CPE: cpe:/o:gentoo:linux, p-cpe:/a:gentoo:linux:mariadb
Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/8/2024
Vulnerability Publication Date: 10/15/2019
CVE: CVE-2019-2938, CVE-2019-2974, CVE-2021-46661, CVE-2021-46662, CVE-2021-46663, CVE-2021-46664, CVE-2021-46665, CVE-2021-46666, CVE-2021-46667, CVE-2021-46668, CVE-2021-46669, CVE-2022-24048, CVE-2022-24050, CVE-2022-24051, CVE-2022-24052, CVE-2022-27376, CVE-2022-27377, CVE-2022-27378, CVE-2022-27379, CVE-2022-27380, CVE-2022-27381, CVE-2022-27382, CVE-2022-27383, CVE-2022-27384, CVE-2022-27385, CVE-2022-27386, CVE-2022-27444, CVE-2022-27445, CVE-2022-27446, CVE-2022-27447, CVE-2022-27448, CVE-2022-27449, CVE-2022-27451, CVE-2022-27452, CVE-2022-27455, CVE-2022-27456, CVE-2022-27457, CVE-2022-31621, CVE-2022-31622, CVE-2022-31623, CVE-2022-31624, CVE-2022-32081, CVE-2022-32082, CVE-2022-32083, CVE-2022-32084, CVE-2022-32085, CVE-2022-32086, CVE-2022-32088, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157