Gentoo's tenshi ebuild is vulnerable to privilege escalation due to the way pid files are handled.
|Package||app-admin/tenshi on all architectures|
|Affected versions||< 0.17|
|Unaffected versions||>= 0.17|
A log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches.
It was discovered that the tenshi ebuild creates a tenshi.pid file after dropping privileges to a non-root account.
A local attacker could escalate privileges to root or kill arbitrary processes.
There is no known workaround at this time.
All tenshi users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/tenshi-0.17"
April 22, 2018
April 22, 2018: 1