A serious Linux terminal bug has surfaced: session replay. Under certain conditions, past terminal input can reappear and execute again, triggered by a new session. This is not a hypothetical flaw. It is reproducible, and it can expose sensitive commands, output, or credentials from old sessions without user intent.
The Linux session replay bug happens when terminal emulators or shells retain residual data in memory buffers. When a new session starts — often after SSH reconnects, a crash, or multiplexer detachment — that leftover data can be pushed into the active shell. In high-security or production environments, the impact is severe: unexpected command execution, secret leaks, or data corruption.
Developers and sysadmins are reporting the bug across different distributions, shells, and terminal multiplexers like tmux and screen. Some cases trace back to kernel-level pseudoterminal (PTY) buffer handling. Others link to emulator-level redraw logic. The common thread: improper clearing of input buffers after a session ends.