pinentry: Local privilege escalation — GLSA 200601-01

pinentry is vulnerable to privilege escalation.

Affected packages

app-crypt/pinentry on all architectures
Affected versions < 0.7.2-r2
Unaffected versions >= 0.7.2-r2

Background

pinentry is a collection of simple PIN or passphrase entry dialogs which utilize the Assuan protocol.

Description

Tavis Ormandy of the Gentoo Linux Security Audit Team has discovered that the pinentry ebuild incorrectly sets the permissions of the pinentry binaries upon installation, so that the sgid bit is set making them execute with the privileges of group ID 0.

Impact

A user of pinentry could potentially read and overwrite files with a group ID of 0.

Workaround

There is no known workaround at this time.

Resolution

All pinentry users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-crypt/pinentry-0.7.2-r2"

References

Release date
January 03, 2006

Latest revision
January 03, 2006: 01

Severity
normal

Exploitable
local

Bugzilla entries