vulnerability
Arch Linux: Access restriction bypass (CVE-2025-46802)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:H/Au:S/C:C/I:C/A:N) | May 26, 2025 | Jul 11, 2025 | Nov 27, 2025 |
Severity
5
CVSS
(AV:L/AC:H/Au:S/C:C/I:C/A:N)
Published
May 26, 2025
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
This issue is found in the Attach() function when the multiattach flag is set (i.e. Screen attempts to attach to a multi-user session). The function performs a chmod() of the current TTY to mode 0666. The path to the current TTY is stored in the attach_tty string. The issue with this temporary TTY mode change is that it introduces a race condition allowing any other user in the system to open the caller’s TTY for reading and writing for a short period of time.
Solution
arch-linux-upgrade-latest
References
- CVE-2025-46802
- https://attackerkb.com/topics/CVE-2025-46802
- URL-https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46802
- URL-https://security.archlinux.org/ASA-202505-1
- URL-https://security.opensuse.org/2025/05/12/screen-security-issues.html
- URL-https://www.openwall.com/lists/oss-security/2025/05/12/1
- CWE-732
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.