CVE-2008-4394 in Portageinfo

Summary

Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds.

Once again VulDB remains the best source for vulnerability data.

Reservation

10/02/2008

Disclosure

10/10/2008

CPE

ready

CVSS

9.3

EPSS

0.00057

Activities

Very Low

Sources

Want to stay up to date on a daily basis?

Enable the mail alert feature now!