Total vulnerabilities in the database
Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds.
Software | From | Fixed in |
---|---|---|
gentoo / portage | 2.1.3.10 | 2.1.3.10.x |
gentoo / portage | 2.0.51.22-r3 | 2.0.51.22-r3.x |
gentoo / portage | - | 2.1.4.4.x |
gentoo / portage | 2.1.3.11 | 2.1.3.11.x |
gentoo / portage | 2.1.1-r2 | 2.1.1-r2.x |