Gentoo's tenshi ebuild is vulnerable to privilege escalation due to the way pid files are handled.
Package | app-admin/tenshi on all architectures |
---|---|
Affected versions | < 0.17 |
Unaffected versions | >= 0.17 |
A log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches.
It was discovered that the tenshi ebuild creates a tenshi.pid file after dropping privileges to a non-root account.
A local attacker could escalate privileges to root or kill arbitrary processes.
There is no known workaround at this time.
All tenshi users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/tenshi-0.17"
Release date
April 22, 2018
Latest revision
April 22, 2018: 1
Severity
normal
Exploitable
local
Bugzilla entries