Gentoo Linux Security Advisory 201709-5 - A vulnerability in chkrootkit may allow local users to gain root privileges. Versions less than 0.50 are affected.
a47c2b30b67fbb7916eaad7a2b14b56e00e69a6ffb121d81b05d425a741c1fa3
Chkrootkit before 0.50 will run any executable file named /tmp/update as root, allowing a trivial privsec. WfsDelay is set to 24h, since this is how often a chkrootkit scan is scheduled by default.
0747e7950fe687c3ab16c47390e8715755184a47efb63dffd00b15a5ba393195
Mandriva Linux Security Advisory 2014-122 - The chkrootkit script contains a flaw that allows a local attacker to create an executable in /tmp that will be run by the user running chkrootkit, allowing the attacker to escalate privileges.
3e7d73d263162ed54908af5486e530dcf8a03564ed24684a8b26a9b7f5160756
Debian Linux Security Advisory 2945-1 - Thomas Stangner discovered a vulnerability in chkrootkit, a rootkit detector, which may allow local attackers to gain root access when /tmp is mounted without the noexec option.
4b40aa0f2ad33b2e2636d7b46693b635f936d7615ef89487925b8fef3321390f
Ubuntu Security Notice 2230-1 - Thomas Stangner discovered that chkrootkit incorrectly quoted certain values. A local attacker could use this issue to execute arbitrary code when chkrootkit is run and gain root privileges.
f11e85e6894830aa661e658a635b9b5d789438cf8bc381a15e40e48d556a589f