Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gentoo portage vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2016-20021
In Gentoo Portage prior to 3.0.47, there is missing PGP validation of executed code: the standalone emerge-webrsync downloads a .gpgsig file but does not perform signature verification. Unless emerge-webrsync is used, Portage is not vulnerable.
Gentoo Portage
2.1
CVSSv2
CVE-2019-20384
Gentoo Portage up to and including 2.3.84 allows local users to place a Trojan horse plugin in the /usr/lib64/nagios/plugins directory by leveraging access to the nagios user account, because this directory is writable in between a call to emake and a call to fowners.
Gentoo Portage
3.6
CVSSv2
CVE-2004-2778
Ebuild in Gentoo may change directory and file permissions depending on the order of installed packages, which allows local users to read or write to restricted directories or execute restricted commands via navigating to the affected directories, or executing the affected comman...
Gentoo Portage
9.3
CVSSv2
CVE-2013-2100
The urlopen function in pym/portage/util/_urlopen.py in Gentoo Portage 2.1.12, when using HTTPS, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and modify binary package lists via a crafted certificate.
Gentoo Portage 2.1.12
6.9
CVSSv2
CVE-2008-4394
Multiple untrusted search path vulnerabilities in Portage prior to 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetc...
Gentoo Portage 2.1.3.11
Gentoo Portage 2.1.3.10
Gentoo Portage
Gentoo Portage 2.1.1
Gentoo Portage 2.0.51.22
2.1
CVSSv2
CVE-2007-6249
etc-update in Portage prior to 2.1.3.11 on Gentoo Linux relies on the umask to set permissions for the merge file, often resulting in permissions weaker than those of the original files, which might allow local users to obtain sensitive information by reading the merge file.
Gentoo Portage
7.2
CVSSv2
CVE-2005-4442
Untrusted search path vulnerability in OpenLDAP prior to 2.2.28-r3 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Openldap Openldap 2.0.13
Openldap Openldap 2.0.15
Openldap Openldap 2.0.21
Openldap Openldap 2.0.23
Openldap Openldap 2.0.3
Openldap Openldap 2.0.5
Openldap Openldap 2.1.12
Openldap Openldap 2.1.14
Openldap Openldap 2.1.20
Openldap Openldap 2.1.22
Openldap Openldap 2.1.27
Openldap Openldap 2.1.29
Openldap Openldap 2.1.8
Openldap Openldap 2.2.10
Openldap Openldap 2.2.17
Openldap Openldap 2.2.19
Openldap Openldap 2.2.24
Openldap Openldap 2.2.26
Openldap Openldap 2.2.9
Openldap Openldap 2.0.12
Openldap Openldap 2.0.14
Openldap Openldap 2.0.16
7.2
CVSSv2
CVE-2005-4443
Untrusted search path vulnerability in Gauche prior to 0.8.6-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Gauche Gauche 0.8
Gauche Gauche 0.8.5
Gauche Gauche 0.8.1
Gauche Gauche 0.8.2
Gauche Gauche 0.8.3
Gauche Gauche 0.8.4
7.2
CVSSv2
CVE-2005-4279
Untrusted search path vulnerability in Qt-UnixODBC prior to 3.3.4-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Gentoo Qt-unixodbc
7.2
CVSSv2
CVE-2005-4280
Untrusted search path vulnerability in CMake prior to 2.2.0-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site request forgery
CVE-2024-34351
CVE-2024-1076
CVE-2024-25522
CVE-2024-34547
CVE-2024-4644
unauthorized
remote
CVE-2024-4671
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »