![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.833256 |
Category: | SuSE Local Security Checks |
Title: | openSUSE: Security Advisory for rxvt (openSUSE-SU-2023:0306-1) |
Summary: | The remote host is missing an update for the 'rxvt'; package(s) announced via the openSUSE-SU-2023:0306-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'rxvt' package(s) announced via the openSUSE-SU-2023:0306-1 advisory. Vulnerability Insight: This update for rxvt-unicode fixes the following issues: - Update to version 9.31: (CVE-2022-4170 boo#1206069) - implement a fix for CVE-2022-4170 (reported and analyzed by David Leadbeater). While present in version 9.30, it should not be exploitable. It is exploitable in versions 9.25 and 9.26, at least, and allows anybody controlling output to the terminal to execute arbitrary code in the urxvt process. - the background extension no longer requires off focus fading support to be compiled in. - the confirm-paste extension now offers a choice between pasting the original or a sanitized version, and also frees up memory used to store the paste text immediately. - fix compiling without frills. - fix rewrapMode: never. - fix regression that caused urxvt to no longer emit responses to OSC color queries other than OSC 4 ones. - fix regression that caused urxvt to no longer process OSC 705. - restore CENTURY to be 1900 to 'improve' year parsing in urclock (or at least go back to the old interpretation) (based on an analysis by Tommy Pettersson). - exec_async (used e.g. by the matcher extension to spawn processes) now sets the URXVT_EXT_WINDOWID variable to the window id of the terminal. - implement -fps option/refreshRate resource to change the default 60 Hz maximum refresh limiter. I always wanted an fps option, but had to wait for a user requesting it. - new clickthrough extension. - perl now also requires Xext. - X region and shape extension functionality has been exposed to perl extensions. - RENDER extension no longer depends on ENABLE_XIM_ONTHESPOT. Affected Software/OS: 'rxvt' package(s) on openSUSE Backports SLE-15-SP4, openSUSE Backports SLE-15-SP5. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-4170 https://security.gentoo.org/glsa/202310-20 https://bugzilla.redhat.com/show_bug.cgi?id=2151597 https://www.openwall.com/lists/oss-security/2022/12/05/1 |
Copyright | Copyright (C) 2024 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |