Joined: 12 May 2004
|Posted: Tue Jan 03, 2006 3:26 pm Post subject: [ GLSA 200601-01 ] pinentry: Local privilege escalation
|Gentoo Linux Security Advisory
Title: pinentry: Local privilege escalation (GLSA 200601-01)
Date: January 03, 2006
pinentry is vulnerable to privilege escalation.
pinentry is a collection of simple PIN or passphrase entry dialogs which utilize the Assuan protocol.
Vulnerable: < 0.7.2-r2
Unaffected: >= 0.7.2-r2
Architectures: All supported architectures
Tavis Ormandy of the Gentoo Linux Security Audit Team has discovered that the pinentry ebuild incorrectly sets the permissions of the pinentry binaries upon installation, so that the sgid bit is set making them execute with the privileges of group ID 0.
A user of pinentry could potentially read and overwrite files with a group ID of 0.
There is no known workaround at this time.
All pinentry users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=app-crypt/pinentry-0.7.2-r2"
Last edited by GLSA on Sun Jan 14, 2007 4:17 am; edited 5 times in total