CVE-2016-20021: Gentoo Portage missing PGP validation of executed code
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.16377%
CWE
Published
1/12/2024
Updated
8/30/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| portage | pip | >= 0, < 3.0.47 | 3.0.47 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from missing PGP validation in emerge-webrsync's handling of webrsync snapshots. The commit 28cd240 explicitly adds PGP verification via gemato and reworks the check_file_signature logic. The diff shows:
- Original check_file_signature lacked proper verification flows (relying on deprecated webrsync-gpg)
- do_snapshot fetched .gpgsig but didn't validate unless explicitly configured
- The patch introduces WEBRSYNC_VERIFY_SIGNATURE handling and gemato integration, confirming the prior absence of validation. These functions were directly responsible for the insecure behavior.