tenshi: Privilege escalation — GLSA 201804-18

Gentoo's tenshi ebuild is vulnerable to privilege escalation due to the way pid files are handled.

Affected Packages

app-admin/tenshi on all architectures
Affected versions < 0.17
Unaffected versions >= 0.17

Background

A log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches.

Description

It was discovered that the tenshi ebuild creates a tenshi.pid file after dropping privileges to a non-root account.

Impact

A local attacker could escalate privileges to root or kill arbitrary processes.

Workaround

There is no known workaround at this time.

Resolution

All tenshi users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-admin/tenshi-0.17"
 

References

Release Date
April 22, 2018

Latest Revision
April 22, 2018: 1

Severity
normal

Exploitable
local

Bugzilla entries