
Cloud Vulnerability DB
A community-led vulnerabilities database
In Gentoo Portage before version 3.0.47, there exists a critical security vulnerability where the standalone emerge-webrsync tool downloads .gpgsig files but fails to perform signature verification. This vulnerability is specifically limited to cases where emerge-webrsync is used; Portage itself is not vulnerable when using other sync methods (NVD).
The vulnerability is classified as an improper verification of cryptographic signature (CWE-347). The issue has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating that it can be exploited remotely with no special privileges or user interaction required (NVD).
The vulnerability could allow an attacker to perform a man-in-the-middle attack during the repository sync process. Since emerge-webrsync downloads but doesn't verify signatures, an attacker could potentially inject malicious code into the Portage tree, leading to system compromise during package installations (Gentoo Bug).
The vulnerability has been fixed in Portage version 3.0.47. Users should upgrade to this version or later to receive the fix. For those unable to upgrade immediately, it is recommended to avoid using emerge-webrsync and instead use alternative sync methods that properly verify signatures (Gentoo News).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."