{"id":"MGASA-2022-0459","summary":"Updated rxvt-unicode packages fix security vulnerability","details":"rxvt-unicode 9.25 and 9.26 are vulnerable to remote code execution, in the\nPerl background extension, when an attacker can control the data written\nto the user's terminal and certain options are set. (CVE-2022-4170)\n","modified":"2026-02-04T03:28:44.657191Z","published":"2022-12-13T22:09:19Z","related":["CVE-2022-4170"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0459.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=31226"},{"type":"REPORT","url":"https://www.openwall.com/lists/oss-security/2022/12/05/1"}],"affected":[{"package":{"name":"rxvt-unicode","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/rxvt-unicode?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.26-1.1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0459.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}