- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202310-20 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: rxvt-unicode: Arbitrary Code Execution Date: October 30, 2023 Bugs: #884787 ID: 202310-20 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A vulnerability has been discovered in rxvt-unicode where data written to the terminal can lead to code execution. Background ========== rxvt-unicode is a clone of the well known terminal emulator rxvt. Affected packages ================= Package Vulnerable Unaffected ---------------------- ------------ ------------ x11-terms/rxvt-unicode < 9.30 >= 9.30 Description =========== A vulnerability has been discovered in rxvt-unicode. Please review the CVE identifiers referenced below for details. Impact ====== in the Perl background extension, when an attacker can control the data written to the user's terminal and certain options are set. The "background" extension is automatically loaded if certain X resources are set such as 'transparent' (see the full list at the top of src/perl/background[1]). So it is possible to be using this extension without realising it. Workaround ========== There is no known workaround at this time. Resolution ========== All rxvt-unicode users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=x11-terms/rxvt-unicode-9.30" References ========== [ 1 ] CVE-2022-4170 https://nvd.nist.gov/vuln/detail/CVE-2022-4170 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202310-20 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5