<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for tmux</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:1834-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-11-05T17:25:17Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-11-05T17:25:17Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-11-05T17:25:17Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for tmux</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for tmux fixes the following issues:

- Update to version 3.1c
  * Fix a stack overflow on colon-separated CSI parsing.
    boo#1178263 CVE-2020-27347

- tmux 3.1b:
  * Fix crash when allow-rename ison and an empty name is set

- tmux 3.1a:
  * Do not close stdout prematurely in control mode since it is
    needed to print exit messages. Prevents hanging when detaching
   with iTerm2
- includes changes between 3.1-rc1 and 3.1:
  * Only search the visible part of the history when marking
    (highlighting) search terms. This is much faster than searching
    the whole history and solves problems with large histories. The
    count of matches shown is now the visible matches rather than
    all matches
  * Search using regular expressions in copy mode. search-forward
    and search-backward use regular expressions by default; the
    incremental versions do not
  * Turn off mouse mode 1003 as well as the rest when exiting
  * Add selection_active format for when the selection is present
    but not moving with the cursor
  * Fix dragging with modifier keys, so binding keys such as
    C-MouseDrag1Pane and C-MouseDragEnd1Pane now work
  * Add -a to list-keys to also list keys without notes with -N
  * Do not jump to next word end if already on a word end when
    selecting a word; fixes select-word with single character words
    and vi(1) keys
  * Fix top and bottom pane calculation with pane border status
    enabled

- Update to v3.1-rc
  * Please see the included CHANGES file

- Fix tmux completion

- Update to v3.0a
  * A lot of changes since v2.9a, please see the included CHANGES
    file.

- Update to v2.9a
  - Fix bugs in select-pane and the main-horizontal and main-vertical layouts.

- Add trailing newline to tmpfiles.d/tmux.conf. On newer systems (such as Leap
  15.1), the lack of a trailing newline appears to cause the directory to not
  be created.
  This is only evident on setups where /run is an actual tmpfs (on btrfs-root
  installs, /run is a btrfs subvolume and thus /run/tmux is persistent across
  reboots).

- Update to version 2.9
  * Add format variables for the default formats in the various modes
    (tree_mode_format and so on) and add a -a flag to display-message
    to list variables with values.
  * Add a -v flag to display-message to show verbose messages as the
    format is parsed, this allows formats to be debugged
  * Add support for HPA (\033[`).
  * Add support for origin mode (\033[?6h).
  * No longer clear history on RIS.
  * Extend the #[] style syntax and use that together with previous
    format changes to allow the status line to be entirely configured
    with a single option.
  * Add E: and T: format modifiers to expand a format twice
    (useful to expand the value of an option).
  * The individual -fg, -bg and -attr options have been removed; they
    were superseded by -style options in tmux 1.9.
  * Add -b to display-panes like run-shell.
  * Handle UTF-8 in word-separators option.
  * New 'terminal' colour allowing options to use the terminal default
    colour rather than inheriting the default from a parent option.
  * Do not move the cursor in copy mode when the mouse wheel is used.
  * Use the same working directory rules for jobs as new windows rather than
    always starting in the user's home.
  * Allow panes to be one line or column in size.
  * Go to last line when goto-line number is out of range in copy mode.
  * Yank previously cut text if any with C-y in the command prompt, only use the
    buffer if no text has been cut.
  * Add q: format modifier to quote shell special characters.
  * Add -Z to find-window.
  * Support for windows larger than the client. This adds two new options,
    window-size and default-size, and a new command, resize-window. The
    force-width and force-height options and the session_width and session_height
    formats have been removed.


- update to 2.8
- move bash-completion to right place
 * Make display-panes block the client until a pane is chosen or it
    times out.
 * Clear history on RIS like most other terminals do.
 * Add an 'Any' key to run a command if a key is pressed that is not
    bound in the current key table.
 * Expand formats in load-buffer and save-buffer.
 * Add a rectangle_toggle format.
 * Add set-hook -R to run a hook immediately.
 * Add pane focus hooks.
 * Allow any punctuation as separator for s/x/y not only /.
 * Improve resizing with the mouse (fix resizing the wrong pane in some
    layouts, and allow resizing multiple panes at the same time).
 * Allow , and } to be escaped in formats as #, and #}.
 * Add KRB5CCNAME to update-environment.
 * Change meaning of -c to display-message so the client is used if it
    matches the session given to -t.
 * Fixes to : form of SGR.
 * Add x and X to choose-tree to kill sessions, windows or panes.

- Add bash completion for tmux

- Update to 2.7
  * Remove EVENT_* variables from environment on platforms where
    tmux uses them so they do not pass on to panes.
  * Fixed for hooks at server exit.
  * Remove SGR 10 (was equivalent to SGR 0 but no other terminal
    seems to do this).
  * Expand formats in window and session names.
  * Add -Z flag to choose-tree, choose-client, choose-buffer to
    automatically zoom the pane when the mode is entered and unzoom
    when it exits, assuming the pane is not already zoomed. This is
    now part of the default key bindings.
  * Add C-g to exit modes with emacs keys.
  * Add exit-empty option to exit server if no sessions (default = on)
  * Show if a filter is present in choose modes.
  * Add pipe-pane -I to to connect stdin of the child process.
  * Performance improvements for reflow.
  * Use RGB terminfo(5) capability to detect RGB colour terminals
    (the existing Tc extension remains unchanged).
  * Support for ISO colon-separated SGR sequences.
  * Add select-layout -E to spread panes out evenly (bound to E key).
  * Support wide characters properly when reflowing.
  * Pass PWD to new panes as a hint to shells, as well as calling
    chdir().
  * Performance improvements for the various choose modes.
  * Only show first member of session groups in tree mode (-G flag
    to choose-tree to show all).
  * Support %else in config files to match %if
  * Fix 'kind' terminfo(5) capability to be S-Down not S-Up.
  * Add a box around the preview label in tree mode.
  * Show exit status and time in the remain-on-exit pane text
  * Correctly use pane-base-index in tree mode.
  * Change the allow-rename option default to off.
  * Support for xterm(1) title stack escape sequences
  * Correctly remove padding cells to fix a UTF-8 display problem
- build from release tarball instead of source (drops automake dep)

- Bash completion is now removed and provided by
- cleanup specfile
  directory with tmpfiles.d functionality in /run/tmux
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-1834</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TARFSZEK7MJQGUKVM5RMUTKCCE3JJLUK/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:1834-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1037468</URL>
      <Description>SUSE Bug 1037468</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1116887</URL>
      <Description>SUSE Bug 1116887</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120170</URL>
      <Description>SUSE Bug 1120170</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178263</URL>
      <Description>SUSE Bug 1178263</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19387/</URL>
      <Description>SUSE CVE CVE-2018-19387 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27347/</URL>
      <Description>SUSE CVE CVE-2020-27347 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12">
      <Branch Type="Product Name" Name="SUSE Package Hub 12">
        <FullProductName ProductID="SUSE Package Hub 12" CPE="cpe:/o:suse:packagehub:12">SUSE Package Hub 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP1">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP1">
        <FullProductName ProductID="SUSE Package Hub 15 SP1">SUSE Package Hub 15 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP2">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP2">
        <FullProductName ProductID="SUSE Package Hub 15 SP2">SUSE Package Hub 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="tmux-3.1c-bp152.2.3.1">
      <FullProductName ProductID="tmux-3.1c-bp152.2.3.1">tmux-3.1c-bp152.2.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="tmux-3.1c-bp152.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:tmux-3.1c-bp152.2.3.1">tmux-3.1c-bp152.2.3.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tmux-3.1c-bp152.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP1">
      <FullProductName ProductID="SUSE Package Hub 15 SP1:tmux-3.1c-bp152.2.3.1">tmux-3.1c-bp152.2.3.1 as a component of SUSE Package Hub 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="tmux-3.1c-bp152.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP2">
      <FullProductName ProductID="SUSE Package Hub 15 SP2:tmux-3.1c-bp152.2.3.1">tmux-3.1c-bp152.2.3.1 as a component of SUSE Package Hub 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="tmux-3.1c-bp152.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:tmux-3.1c-bp152.2.3.1">tmux-3.1c-bp152.2.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="tmux-3.1c-bp152.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:tmux-3.1c-bp152.2.3.1">tmux-3.1c-bp152.2.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.</Note>
    </Notes>
    <CVE>CVE-2018-19387</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:tmux-3.1c-bp152.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP1:tmux-3.1c-bp152.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:tmux-3.1c-bp152.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:tmux-3.1c-bp152.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:tmux-3.1c-bp152.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TARFSZEK7MJQGUKVM5RMUTKCCE3JJLUK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19387.html</URL>
        <Description>CVE-2018-19387</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116887</URL>
        <Description>SUSE Bug 1116887</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.</Note>
    </Notes>
    <CVE>CVE-2020-27347</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:tmux-3.1c-bp152.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP1:tmux-3.1c-bp152.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:tmux-3.1c-bp152.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:tmux-3.1c-bp152.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:tmux-3.1c-bp152.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TARFSZEK7MJQGUKVM5RMUTKCCE3JJLUK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27347.html</URL>
        <Description>CVE-2020-27347</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178263</URL>
        <Description>SUSE Bug 1178263</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178316</URL>
        <Description>SUSE Bug 1178316</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
