Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Gentoo Subscribe
Filtered by product Portage
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-20384 1 Gentoo 1 Portage 2021-07-21 2.1 LOW 5.5 MEDIUM
Gentoo Portage through 2.3.84 allows local users to place a Trojan horse plugin in the /usr/lib64/nagios/plugins directory by leveraging access to the nagios user account, because this directory is writable in between a call to emake and a call to fowners.
CVE-2013-2100 1 Gentoo 1 Portage 2017-08-28 9.3 HIGH N/A
The urlopen function in pym/portage/util/_urlopen.py in Gentoo Portage 2.1.12, when using HTTPS, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and modify binary package lists via a crafted certificate.
CVE-2008-4394 1 Gentoo 1 Portage 2017-08-07 6.9 MEDIUM N/A
Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds.
CVE-2007-6249 1 Gentoo 2 Linux, Portage 2017-08-07 2.1 LOW N/A
etc-update in Portage before 2.1.3.11 on Gentoo Linux relies on the umask to set permissions for the merge file, often resulting in permissions weaker than those of the original files, which might allow local users to obtain sensitive information by reading the merge file.
CVE-2004-2778 1 Gentoo 1 Portage 2017-07-05 3.6 LOW 7.1 HIGH
Ebuild in Gentoo may change directory and file permissions depending on the order of installed packages, which allows local users to read or write to restricted directories or execute restricted commands via navigating to the affected directories, or executing the affected commands.