GLSA-200601-01 : pinentry: Local privilege escalation

Medium Nessus Plugin ID 20411


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-200601-01 (pinentry: Local privilege escalation)

Tavis Ormandy of the Gentoo Linux Security Audit Team has discovered that the pinentry ebuild incorrectly sets the permissions of the pinentry binaries upon installation, so that the sgid bit is set making them execute with the privileges of group ID 0.
Impact :

A user of pinentry could potentially read and overwrite files with a group ID of 0.
Workaround :

There is no known workaround at this time.


All pinentry users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=app-crypt/pinentry-0.7.2-r2'

See Also

Plugin Details

Severity: Medium

ID: 20411

File Name: gentoo_GLSA-200601-01.nasl

Version: $Revision: 1.11 $

Type: local

Published: 2006/01/15

Modified: 2015/04/13

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:N

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:pinentry, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 2006/01/03

Vulnerability Publication Date: 2006/01/03

Reference Information

CVE: CVE-2006-0071

OSVDB: 22211

GLSA: 200601-01