tenshi: Privilege escalation Gentoo's tenshi ebuild is vulnerable to privilege escalation due to the way pid files are handled. tenshi 2018-04-22 2018-04-22 626654 local 0.17 0.17

A log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches.

It was discovered that the tenshi ebuild creates a tenshi.pid file after dropping privileges to a non-root account.

A local attacker could escalate privileges to root or kill arbitrary processes.

There is no known workaround at this time.

All tenshi users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/tenshi-0.17"
CVE-2017-11746 b-man b-man