This is a problem with using cat(1) or tail(1) to inspect potentially
malicious files; less(1) does not interpret the control chars by
default, so it's safer to use. Something like:

less +F /path/to/file
will behave similar to:
tail -f /path/to/file

For more information, see:

http://www.openwall.com/lists/oss-security/2015/08/11/8

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1618229

Title:
  rsyslogd terminal escape sequences injection

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rsyslog/+bug/1618229/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to