Security researchers have confirmed a new Linux terminal bug that allows privilege escalation through crafted escape sequences. When triggered, the bug lets a non-privileged user run commands with root permissions. It affects multiple distributions and terminal emulators, and the exploit requires only a low level of access to begin with.
The root cause is improper sanitization of input data parsed by the terminal. By injecting malicious control codes into output displayed in the terminal, attackers can manipulate the environment and trigger unsafe operations in connected processes. This is not theoretical. Proof-of-concept code is circulating privately, and exploitation is considered straightforward for anyone with local shell access.
Systems most at risk are those used by multiple users, connected to remote shells, or processing logs and data files that could contain embedded escape sequences. Containers are not immune. Virtualized environments are also exposed if administrators use vulnerable terminals to manage them.