In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/tmux/tmux/commit/a868bacb46e3c900530bed47a1c6f85b0fbe701c | third party advisory patch |
https://www.openwall.com/lists/oss-security/2020/11/05/3 | mailing list exploit third party advisory |
https://security.gentoo.org/glsa/202011-10 | third party advisory vendor advisory |
https://raw.githubusercontent.com/tmux/tmux/3.1c/CHANGES | third party advisory release notes |