Name | CVE-2025-49809 |
Description | mtr through 0.95, in certain privileged contexts, mishandles execution of a program specified by the MTR_PACKET environment variable. NOTE: mtr on macOS may often have Sudo rules, as an indirect consequence of Homebrew not installing setuid binaries. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
mtr (PTS) | bullseye | 0.94-1+deb11u1 | vulnerable |
| bookworm | 0.95-1 | vulnerable |
| trixie | 0.95-1.1 | vulnerable |
| forky, sid | 0.96-1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
mtr | source | (unstable) | (unfixed) | unimportant | | |
Notes
In Debian, mtr runs unprivileged and exec-s mtr-packet (or env[MTR_PACKAGE])
which has cap_net_raw.
Mitigation: if running mtr through sudo (typically MacOSX), requires
touching /etc/mtr.is.run.under.sudo to disable ENV[MTR_PACKET] fallback.
Fixed by: https://github.com/traviscross/mtr/commit/5226f105f087c29d3cfad9f28000e7536af91ac6
Introduced by: https://github.com/traviscross/mtr/commit/fcda9e8b82ca354049fa0ee9cfcb2eaaae623ee0 (v0.88)
Negligible security impact on Debian