First published: Fri Jan 12 2024(Updated: )
In Gentoo Portage before 3.0.47, there is missing PGP validation of executed code: the standalone emerge-webrsync downloads a .gpgsig file but does not perform signature verification. Unless emerge-webrsync is used, Portage is not vulnerable.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gentoo Portage | <3.0.47 | |
pip/portage | >=0<3.0.47 | 3.0.47 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-20021 has a severity rating that indicates a potential risk due to the lack of PGP validation in Gentoo Portage.
To fix CVE-2016-20021, upgrade your Gentoo Portage installation to version 3.0.47 or later.
CVE-2016-20021 affects Gentoo Portage versions prior to 3.0.47 when using the emerge-webrsync command.
CVE-2016-20021 is not classified as a critical vulnerability, but it does pose risks if not addressed.
CVE-2016-20021 involves a missing PGP validation in Gentoo Portage's emerge-webrsync, which could lead to executing unverified code.