|
Message-ID: <CANO=Ty1O8VjFrbhFDW73aeoyOrpoMYp22A=ExDvXtWG1hpTPgQ@mail.gmail.com> Date: Thu, 13 Aug 2015 15:00:35 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security <oss-security@...ts.openwall.com> Subject: Audit: log terminal emulator escape sequences handling CVE-2015-5186 Steve Grubb of Red Hat reports: When auditing the filesystem the names of files are logged. These filenames can contain escape sequences, when viewed using the ausearch programs "-i" option for example this can result in the escape sequences being processed unsafely by the terminal program being used to view the data. This has been corrected upstream with the following commit: https://fedorahosted.org/audit/changeset/1122 Easy workaround: don't use really old terminals/rxvt/etc that are vulnerable to escape sequence handling issues. -- -- Kurt Seifried -- Red Hat -- Product Security -- Cloud PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 Red Hat Product Security contact: secalert@...hat.com
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.