GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Mon Apr 23, 2018 1:26 am Post subject: [ GLSA 201804-18 ] tenshi |
|
|
Gentoo Linux Security Advisory
Title: tenshi: Privilege escalation (GLSA 201804-18)
Severity: normal
Exploitable: local
Date: 2018-04-22
Bug(s): #626654
ID: 201804-18
Synopsis
Gentoo's tenshi ebuild is vulnerable to privilege escalation due to
the way pid files are handled.
Background
A log monitoring program, designed to watch one or more log files for
lines matching user defined regular expressions and report on the
matches.
Affected Packages
Package: app-admin/tenshi
Vulnerable: < 0.17
Unaffected: >= 0.17
Architectures: All supported architectures
Description
It was discovered that the tenshi ebuild creates a tenshi.pid file after
dropping privileges to a non-root account.
Impact
A local attacker could escalate privileges to root or kill arbitrary
processes.
Workaround
There is no known workaround at this time.
Resolution
All tenshi users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/tenshi-0.17"
|
References
CVE-2017-11746 |
|