• [gentoo-announce] [ GLSA 202409-01 ] Portage: Unverified PGP Signatures

    From glsamaker@gentoo.org@21:1/5 to All on Sun Sep 22 07:50:01 2024
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202409-01
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: Normal
    Title: Portage: Unverified PGP Signatures
    Date: September 22, 2024
    Bugs: #905356
    ID: 202409-01

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    A vulnerability has been discovered in Portage, where PGP signatures
    would not be verified.

    Background
    ==========

    Portage is the default Gentoo package management system.

    Affected packages
    =================

    Package Vulnerable Unaffected
    ---------------- ------------ ------------
    sys-apps/portage < 3.0.47 >= 3.0.47

    Description
    ===========

    Multiple vulnerabilities have been discovered in Portage. Please review
    the CVE identifiers referenced below for details.

    Impact
    ======

    When using the webrsync mechanism to sync the tree the PGP signatures
    that protect the integrity of the data in the tree would not be
    verified. This would allow a man-in-the-middle attack to inject
    arbitrary content into the tree.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Portage users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=sys-apps/portage-3.0.47"

    References
    ==========

    [ 1 ] CVE-2016-20021
    https://nvd.nist.gov/vuln/detail/CVE-2016-20021

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202409-01

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2024 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmbvrW4ACgkQFMQkOaVy +9lTow/9HMRNTj3LVhMG1XrR5mtpFeHuuiLE7agY4bcdDvLo0i3ERtjJdpruc+b9 N83bGdLA1qjZHG0AzvY96PQdNRtGlbtl0cHhjZeOdj0dv3G7XzGuxZh+7hhfghj7 6HGGqPNaAgiN+2Ad3Mn0W57/f7hjnNLUVI7//EhBKEhKeQFvS/72FkMnulNLjPMo auN5Fk1DI3ih5X+w40/b0f+NpSqdvbU/Xp00ZuNAYK/QI5JTgCneHWANkFu3cIp1 nbLuAXndpxDLh5uZmWDltJ6tfcl3b3SFmIgICNOMyH489K13QIWf618yjNiPvvv6 EtRzedvWIi49mQStvkqThBECiyimVx5HrM9bXh4Gvnre7gUzfxSS9KR3SRGuYZ9Y tpNageSDlJpyqK27w6XVqJnrCv2l2fTrZrHCW9q904oIgpSdUWkdGRU67mUIFbHX DMIuxj0mrxqGjk3b+rsLlsJ20G8hRYHkOOLUv0Lhdo/pHwV36nu2i8LXg/40V2hm PkBR9k0QZxxQorjs5HsQJ/15zCWaB0nTNa+wxIO7XXo/uJQ9tLunowL6v6Yue8Nx plZy/D96WWyxjeLx1zfCqN7uRC07xe1Hzf1gbZ2Sf8Sgr004hukUKTNHM57IDKKU qPBjhgoC7yIzd1qvjyEcG7ARk/uvrfL15hSc94DKb6k4qExNEec=
    =kivt
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)