An attacker can crash or execute arbitrary code inside tmux server process by writing a special escape sequence to the pane's pseudo tty. Code execution is proved practical only if tmux address space isn't fully randomized. So ASLR with PIE will mitigiate this issue but more complex exploits may be theoretically created. Reference: https://raw.githubusercontent.com/tmux/tmux/3.1c/CHANGES Upstream patch: https://github.com/tmux/tmux/commit/a868bacb46e3c900530bed47a1c6f85b0fbe701c
Acknowledgments: Name: Sergey Nizovtsev
Created tmux tracking bugs for this issue: Affects: fedora-all [bug 1894205]
Statement: tmux as shipped with Red Hat Enterprise Linux of any version is not affected because the vulnerable code exists in newer versions of tmux than those shipped.
The affected version for this flaw is tmux-2.9 and greater.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-27347