Vulnerabilities > Gentoo > Portage

DATE CVE VULNERABILITY TITLE RISK
2024-01-12 CVE-2016-20021 Improper Verification of Cryptographic Signature vulnerability in Gentoo Portage
In Gentoo Portage before 3.0.47, there is missing PGP validation of executed code: the standalone emerge-webrsync downloads a .gpgsig file but does not perform signature verification.
network
low complexity
gentoo CWE-347
critical
9.8
2020-01-21 CVE-2019-20384 Improper Preservation of Permissions vulnerability in Gentoo Portage
Gentoo Portage through 2.3.84 allows local users to place a Trojan horse plugin in the /usr/lib64/nagios/plugins directory by leveraging access to the nagios user account, because this directory is writable in between a call to emake and a call to fowners.
local
low complexity
gentoo CWE-281
2.1
2017-06-27 CVE-2004-2778 Permissions, Privileges, and Access Controls vulnerability in Gentoo Portage
Ebuild in Gentoo may change directory and file permissions depending on the order of installed packages, which allows local users to read or write to restricted directories or execute restricted commands via navigating to the affected directories, or executing the affected commands.
local
low complexity
gentoo CWE-264
3.6
2014-09-29 CVE-2013-2100 Cryptographic Issues vulnerability in Gentoo Portage 2.1.12
The urlopen function in pym/portage/util/_urlopen.py in Gentoo Portage 2.1.12, when using HTTPS, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and modify binary package lists via a crafted certificate.
network
gentoo CWE-310
critical
9.3
2008-10-10 CVE-2008-4394 Local Privilege Escalation vulnerability in Gentoo 'sys-apps/portage' Search Path
Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds.
local
gentoo
6.9
2007-12-15 CVE-2007-6249 Information Exposure vulnerability in Gentoo Portage 2.0.51.22/2.1.1/2.1.3.10
etc-update in Portage before 2.1.3.11 on Gentoo Linux relies on the umask to set permissions for the merge file, often resulting in permissions weaker than those of the original files, which might allow local users to obtain sensitive information by reading the merge file.
local
low complexity
gentoo CWE-200
2.1
2004-12-31 CVE-2004-1901 Link Following vulnerability in Gentoo Linux and Portage
Portage before 2.0.50-r3 allows local users to overwrite arbitrary files via a hard link attack on the lockfiles.
local
low complexity
gentoo CWE-59
5.5