vulnerability
Arch Linux: Privilege escalation (CVE-2025-23395)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | May 26, 2025 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
May 26, 2025
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
This issue affects Screen 5.0.0 when it runs with setuid-root privileges. The function logfile_reopen() does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with root ownership, the invoking user’s (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file. Also already existing files can be abused for logging in this manner: the data will be appended to the file in question, but the file mode and ownership will be left unchanged.
Screen correctly drops privileges when it initially opens the logfile. The privilege escalation becomes possible as soon as Screen believes it is necessary to reopen the logfile. Screen checks this by calling stolen_logfile() before writing to the file. The call to logfile_reopen() happens when the link count of the originally opened logfile drops to zero, or if it unexpectedly changes in size. This condition can be triggered at will on the end of the unprivileged user.
Screen correctly drops privileges when it initially opens the logfile. The privilege escalation becomes possible as soon as Screen believes it is necessary to reopen the logfile. Screen checks this by calling stolen_logfile() before writing to the file. The call to logfile_reopen() happens when the link count of the originally opened logfile drops to zero, or if it unexpectedly changes in size. This condition can be triggered at will on the end of the unprivileged user.
Solution
arch-linux-upgrade-latest
References
- CVE-2025-23395
- https://attackerkb.com/topics/CVE-2025-23395
- URL-https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-23395
- URL-https://security.archlinux.org/ASA-202505-1
- URL-https://security.opensuse.org/2025/05/12/screen-security-issues.html
- URL-https://www.openwall.com/lists/oss-security/2025/05/12/1
- CWE-271
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.