|
Message-ID: <Z3f9N0Qo-qIJXfJO@netmeister.org> Date: Fri, 3 Jan 2025 10:07:35 -0500 From: Jan Schaumann <jschauma@...meister.org> To: oss-security@...ts.openwall.com Subject: iTerm2 < 3.5.11 logs input/ouput to /tmp/framer.txt on remote host iterm2 (https://iterm2.com), a popular Terminal.app replacement for macOS, announced a vulnerability in versions < 3.5.11 whereby input/output from an SSH connection may be logged to the file /tmp/framer.txt on the remote host. To the best of my knowledge, there is no CVE associated with this vulnerability. The announcement (below) notes that this file "may be readable by other users", presumably depending on the user's umask on that system. iterm2 is published under the GPL with source code available here: https://github.com/gnachman/iTerm2 Announcement and change log: https://iterm2.com/downloads/stable/iTerm2-3_5_11.changelog --- Version 3.5.11 of iTerm2 was built on January 2, 2025. This release contains a critical security fix. I strongly recommend updating immediately. Who is affected? ---------------- You may be affected if you used the SSH integration feature in any of the following versions: * 3.5.6 * 3.5.7 * 3.5.8 * 3.5.9 * 3.5.10 * Any beta versions of 3.5.6 and later. What is the issue? ------------------ A bug in the SSH integration feature caused input and output to be logged to a file on the remote host. This file, /tmp/framer.txt, may be readable by other users on the remote host. When does this occur? --------------------- The issue occurs if both of the following conditions are true: 1. Either: a) You used the it2ssh command, or b) In Settings > Profiles > General, the Command popup menu was set to "SSH" (not "Login Shell", "Command", or "Custom Command") AND "SSH Integration" was checked in the SSH configuration dialog. That dialog is shown when you click the Configure button next to the ssh arguments field in Settings. 2. The remote host has Python 3.7 or later installed in its default search path. What should you do? ------------------- * Upgrade immediately to version 3.5.11. * Delete /tmp/framer.txt on affected hosts. How I'm addressing this ----------------------- I deeply regret this mistake and will take steps to ensure it never happens again. The code to write to log files in SSH integration has been deleted and will not be publicly released again. If you have questions you can contact me at gnachman@...il.com. SHA-256 of the zip file is You can use the following to verify the zip file on https://keybase.io/verify: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 655e32b4a9466104f1b0d8847e852515bc332bdf434801762e01b9625caa43e2 -----BEGIN PGP SIGNATURE----- iHUEAREIAB0WIQSAPIQGkYVsjnBRo2J0Et0TaFtKrAUCZ3br8gAKCRB0Et0TaFtK rLntAQDqPcKkRA23Wo5/XuB2lymF8n+0GK3E+ZT3MYbTNgsnSQD/Xgt7V9QhP42n QmQpnmb804FrHkCnqIJMvcBAim6AbBM= =Zlrw -----END PGP SIGNATURE----- ---
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.