Lucene search

K
slackwareSlackware Linux ProjectSSA-2023-003-02
HistoryJan 04, 2023 - 2:20 a.m.

[slackware-security] rxvt-unicode

2023-01-0402:20:13
Slackware Linux Project
www.slackware.com
14
rxvt-unicode
slackware 15.0
security fix
patch
arbitrary code
cve-2022-4170
ftp hosting

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.006 Low

EPSS

Percentile

77.9%

New rxvt-unicode packages are available for Slackware 15.0 and -current to
fix a security issue.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/rxvt-unicode-9.26-i586-3_slack15.0.txz: Rebuilt.
When the “background” extension was loaded, an attacker able to control the
data written to the terminal would be able to execute arbitrary code as the
terminal’s user. Thanks to David Leadbeater and Ben Collver.
For more information, see:
https://www.openwall.com/lists/oss-security/2022/12/05/1
https://vulners.com/cve/CVE-2022-4170
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/rxvt-unicode-9.26-i586-3_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/rxvt-unicode-9.26-x86_64-3_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/rxvt-unicode-9.26-i586-4.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/rxvt-unicode-9.26-x86_64-4.txz

MD5 signatures:

Slackware 15.0 package:
c4d36c39293db26731902a472b727c04 rxvt-unicode-9.26-i586-3_slack15.0.txz

Slackware x86_64 15.0 package:
232412389e34110a7ab43f85693ee791 rxvt-unicode-9.26-x86_64-3_slack15.0.txz

Slackware -current package:
b49b5562b6b5f0e24bbe253b714e68e5 xap/rxvt-unicode-9.26-i586-4.txz

Slackware x86_64 -current package:
361b6f0a18517128ede7c16ac5d47e80 xap/rxvt-unicode-9.26-x86_64-4.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg rxvt-unicode-9.26-i586-3_slack15.0.txz

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.006 Low

EPSS

Percentile

77.9%