Issue Overview:
socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process. (CVE-2023-24626)
Affected Packages:
screen
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update screen to update your system.
New Packages:
aarch64:
screen-4.1.0-0.27.20120314git3c2946.amzn2.0.1.aarch64
screen-debuginfo-4.1.0-0.27.20120314git3c2946.amzn2.0.1.aarch64
i686:
screen-4.1.0-0.27.20120314git3c2946.amzn2.0.1.i686
screen-debuginfo-4.1.0-0.27.20120314git3c2946.amzn2.0.1.i686
src:
screen-4.1.0-0.27.20120314git3c2946.amzn2.0.1.src
x86_64:
screen-4.1.0-0.27.20120314git3c2946.amzn2.0.1.x86_64
screen-debuginfo-4.1.0-0.27.20120314git3c2946.amzn2.0.1.x86_64
Red Hat: CVE-2023-24626
Mitre: CVE-2023-24626
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | aarch64 | screen | < 4.1.0-0.27.20120314git3c2946.amzn2.0.1 | screen-4.1.0-0.27.20120314git3c2946.amzn2.0.1.aarch64.rpm |
Amazon Linux | 2 | aarch64 | screen-debuginfo | < 4.1.0-0.27.20120314git3c2946.amzn2.0.1 | screen-debuginfo-4.1.0-0.27.20120314git3c2946.amzn2.0.1.aarch64.rpm |
Amazon Linux | 2 | i686 | screen | < 4.1.0-0.27.20120314git3c2946.amzn2.0.1 | screen-4.1.0-0.27.20120314git3c2946.amzn2.0.1.i686.rpm |
Amazon Linux | 2 | i686 | screen-debuginfo | < 4.1.0-0.27.20120314git3c2946.amzn2.0.1 | screen-debuginfo-4.1.0-0.27.20120314git3c2946.amzn2.0.1.i686.rpm |
Amazon Linux | 2 | x86_64 | screen | < 4.1.0-0.27.20120314git3c2946.amzn2.0.1 | screen-4.1.0-0.27.20120314git3c2946.amzn2.0.1.x86_64.rpm |
Amazon Linux | 2 | x86_64 | screen-debuginfo | < 4.1.0-0.27.20120314git3c2946.amzn2.0.1 | screen-debuginfo-4.1.0-0.27.20120314git3c2946.amzn2.0.1.x86_64.rpm |