ArchLinux: 201707-24: rkhunter: arbitrary code execution
Summary
rkhunter downloads updates over a plain HTTP link with a version certificate that can be faked. A potential man-in-the-middle attack can lead to the execution of arbitrary code.
Resolution
Upgrade to 1.4.4-1.
# pacman -Syu "rkhunter>=1.4.4-1"
The problem has been fixed upstream in version 1.4.4.
References
http://openwall.com/lists/oss-security/2017/06/29/2 https://security.archlinux.org/CVE-2017-7480
Workaround
None.