CVE-2023-24626

NameCVE-2023-24626
Descriptionsocket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
screen (PTS)jessie, jessie (lts)4.2.1-3+deb8u2vulnerable
stretch (security), stretch (lts), stretch4.5.0-6+deb9u1vulnerable
buster (security), buster, buster (lts)4.6.2-3+deb10u1vulnerable
bullseye4.8.0-6vulnerable
bookworm4.9.0-4vulnerable
sid, trixie4.9.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
screensource(unstable)4.9.1-1unimportant

Notes

https://savannah.gnu.org/bugs/?63195 (private)
https://git.savannah.gnu.org/cgit/screen.git/commit/?id=e9ad41bfedb4537a6f0de20f00b27c7739f168f7
screen in Debian not installed setuid or setgid

Search for package or bug name: Reporting problems