Gentoo 2530 Published by

Gentoo Linux has released several security updates to address various vulnerabilities. The updates include patches for Commons-BeanUtils, which can lead to arbitrary code execution, and Asterisk, which is vulnerable to multiple issues. Additionally, GIMP and Vim are also affected by arbitrary code execution and multiple vulnerabilities, respectively. The inetutils package is another priority update due to a remote code execution vulnerability.

[ GLSA 202601-05 ] Commons-BeanUtils: Arbitary Code Execution
[ GLSA 202601-04 ] Asterisk: Multiple Vulnerabilities
[ GLSA 202601-03 ] GIMP: Arbitrary Code Execution
[ GLSA 202601-02 ] Vim, gVim: Multiple Vulnerabilities
[ GLSA 202601-01 ] inetutils: Remote Code Execution




[ GLSA 202601-05 ] Commons-BeanUtils: Arbitary Code Execution


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202601-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: High
Title: Commons-BeanUtils: Arbitary Code Execution
Date: January 26, 2026
Bugs: #960929
ID: 202601-05

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

A vulnerability has been discovered in Commons-BeanUtils, which can lead
to execution of arbitrary code.

Background
==========

Commons-beanutils provides easy-to-use wrappers around Reflection and
Introspection APIs

Affected packages
=================

Package Vulnerable Unaffected
-------------------------- ------------ ------------
dev-java/commons-beanutils < 1.11.0 >= 1.11.0

Description
===========

Multiple vulnerabilities have been discovered in Commons-BeanUtils.
Please review the CVE identifiers referenced below for details.

Impact
======

A special BeanIntrospector class was added in version 1.9.2. This can be
used to stop attackers from using the declared class property of Java
enum objects to get access to the classloader. However this protection
was not enabled by default. PropertyUtilsBean (and consequently
BeanUtilsBean) now disallows declared class level property access by
default.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Commons-BeanUtils users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-java/commons-beanutils-1.11.0"

References
==========

[ 1 ] CVE-2025-48734
https://nvd.nist.gov/vuln/detail/CVE-2025-48734

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202601-05

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2026 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5



[ GLSA 202601-04 ] Asterisk: Multiple Vulnerabilities


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202601-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: High
Title: Asterisk: Multiple Vulnerabilities
Date: January 26, 2026
Bugs: #960930
ID: 202601-04

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been discovered in Asterisk, the worst of
which can lead to arbitrary code execution.

Background
==========

Asterisk is an open source telephony engine and toolkit.

Affected packages
=================

Package Vulnerable Unaffected
----------------- ------------ ------------
net-misc/asterisk < 18.26.3 >= 18.26.3

Description
===========

Multiple vulnerabilities have been discovered in Asterisk. Please review
the CVE identifiers referenced below for details.

Impact
======

Please review the referenced CVE identifiers for details.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/asterisk-18.26.3"

References
==========

[ 1 ] CVE-2025-1131
https://nvd.nist.gov/vuln/detail/CVE-2025-1131
[ 2 ] CVE-2025-49832
https://nvd.nist.gov/vuln/detail/CVE-2025-49832
[ 3 ] CVE-2025-57767
https://nvd.nist.gov/vuln/detail/CVE-2025-57767
[ 4 ] GHSA-64qc-9x89-rx5j
[ 5 ] GHSA-mrq5-74j5-f5cr
[ 6 ] GHSA-v9q8-9j8m-5xwp

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202601-04

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2026 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5



[ GLSA 202601-03 ] GIMP: Arbitrary Code Execution


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202601-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: High
Title: GIMP: Arbitrary Code Execution
Date: January 26, 2026
Bugs: #965334
ID: 202601-03

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

A vulnerability has been discovered in GIMP, which can lead to execution
of arbitrary code.

Background
==========

GIMP is the GNU Image Manipulation Program. XCF is the native image file
format used by GIMP.

Affected packages
=================

Package Vulnerable Unaffected
-------------- ------------ -------------
media-gfx/gimp < 2.10.38-r3 >= 2.10.38-r3

Description
===========

A vulnerability has been discovered in GIMP. Please review the CVE
identifier referenced below for details.

Impact
======

This vulnerability allows remote attackers to execute arbitrary code on
affected installations of GIMP. User interaction is required to exploit
this vulnerability in that the target must visit a malicious page or
open a malicious file.

The specific flaw exists within the parsing of XWD files. The issue
results from the lack of proper validation of the length of user-
supplied data prior to copying it to a heap-based buffer. An attacker
can leverage this vulnerability to execute code in the context of the
current process.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All GIMP users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=media-gfx/gimp-3.0.6"

All GIMP 2.x users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=media-gfx/gimp-2.10.38-r3 =media-gfx/gimp-2*"

References
==========

[ 1 ] CVE-2025-10934
https://nvd.nist.gov/vuln/detail/CVE-2025-10934
[ 2 ] GHSA-wv7v-cchq-8fjh

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202601-03

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2026 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5



[ GLSA 202601-02 ] Vim, gVim: Multiple Vulnerabilities


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202601-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: High
Title: Vim, gVim: Multiple Vulnerabilities
Date: January 26, 2026
Bugs: #961498
ID: 202601-02

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been discovered in Vim and gVim, the worst
of which could lead to execution of arbitrary code.

Background
==========

Vim is an efficient, highly configurable improved version of the classic
‘vi’ text editor. gVim is the GUI version of Vim.

Affected packages
=================

Package Vulnerable Unaffected
-------------------- ------------ ------------
app-editors/gvim < 9.1.1652 >= 9.1.1652
app-editors/vim < 9.1.1652 >= 9.1.1652
app-editors/vim-core < 9.1.1652 >= 9.1.1652

Description
===========

Multiple vulnerabilities have been discovered in Vim, gVim. Please
review the CVE identifiers referenced below for details.

Impact
======

Please review the referenced CVE identifiers for details.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Vim, gVim users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-editors/vim-9.1.1652"

All Vim, gVim users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-editors/vim-core-9.1.1652"

All Vim, gVim users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-editors/gvim-9.1.1652"

References
==========

[ 1 ] CVE-2025-53905
https://nvd.nist.gov/vuln/detail/CVE-2025-53905
[ 2 ] CVE-2025-53906
https://nvd.nist.gov/vuln/detail/CVE-2025-53906

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202601-02

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2026 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5



[ GLSA 202601-01 ] inetutils: Remote Code Execution


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202601-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: High
Title: inetutils: Remote Code Execution
Date: January 26, 2026
Bugs: #969065
ID: 202601-01

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

A vulnerability has been discovered in the telnetd module of inetutils,
which allows remote code execution as root.

Background
==========

Inetutils is a collection of common network programs including a telnet
client and server.

Affected packages
=================

Package Vulnerable Unaffected
------------------ ------------ ------------
net-misc/inetutils < 2.7 >= 2.7

Description
===========

The telnetd server invokes /usr/bin/login (normally running as root)
passing the value of the USER environment variable received from the
client as the last parameter.

If the client supply a carefully crafted USER environment value being
the string "-f root", and passes the telnet(1) -a or --login parameter
to send this USER environment to the server, the client will be
automatically logged in as root bypassing normal authentication
processes.

This happens because the telnetd server do not sanitize the USER
environment variable before passing it on to login(1), and login(1) uses
the -f parameter to by-pass normal authentication.

Impact
======

An attacker can login as root via the telnetd daemon.

Workaround
==========

Reinstall inetutils with the telnetd USE flag disabled. This is the
default in Gentoo.

Resolution
==========

All inetutils users with the telnetd USE flag enabled should upgrade to
the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/inetutils-2.7"

References
==========

[ 1 ] CVE-2026-24061
https://nvd.nist.gov/vuln/detail/CVE-2026-24061

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202601-01

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2026 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5