Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds.
2008-10-10T10:30:05.200
2025-04-09T00:30:58.490
Deferred
CVSSv2: 6.9 (MEDIUM)
AV:L/AC:M/Au:N/C:C/I:C/A:C
3.4
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | gentoo | portage | ≤ 2.1.4.4 | Yes |
Application | gentoo | portage | 2.0.51.22 | Yes |
Application | gentoo | portage | 2.1.1 | Yes |
Application | gentoo | portage | 2.1.3.10 | Yes |
Application | gentoo | portage | 2.1.3.11 | Yes |