Gentoo: tcptraceroute privilege escalation vulnerability
Summary
GENTOO LINUX SECURITY ANNOUNCEMENT 200306-14
quote from cve:
"tcptraceroute 1.4 and earlier does not fully drop privileges after obtaining a file descriptor for capturing packets, which may allow local users to gain access to the descriptor via a separate vulnerability in tcptraceroute."
SOLUTION
It is recommended that all Gentoo Linux users who are running net-analyzer/tcptraceroute upgrade to tcptraceroute-1.4-r1 as follows
emerge sync emerge tcptraceroute emerge clean
aliz@gentoo.org - GnuPG key is available at
Resolution
References
Availability
Concerns
Background