CVE-2025-49809

NameCVE-2025-49809
Descriptionmtr through 0.95, in certain privileged contexts, mishandles execution of a program specified by the MTR_PACKET environment variable. NOTE: mtr on macOS may often have Sudo rules, as an indirect consequence of Homebrew not installing setuid binaries.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mtr (PTS)bullseye0.94-1+deb11u1vulnerable
bookworm0.95-1vulnerable
trixie0.95-1.1vulnerable
forky, sid0.96-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mtrsource(unstable)(unfixed)unimportant

Notes

In Debian, mtr runs unprivileged and exec-s mtr-packet (or env[MTR_PACKAGE])
which has cap_net_raw.
Mitigation: if running mtr through sudo (typically MacOSX), requires
touching /etc/mtr.is.run.under.sudo to disable ENV[MTR_PACKET] fallback.
Fixed by: https://github.com/traviscross/mtr/commit/5226f105f087c29d3cfad9f28000e7536af91ac6
Introduced by: https://github.com/traviscross/mtr/commit/fcda9e8b82ca354049fa0ee9cfcb2eaaae623ee0 (v0.88)
Negligible security impact on Debian

Search for package or bug name: Reporting problems