vulnerability
Arch Linux: Privilege escalation (CVE-2025-46804)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:S/C:P/I:N/A:N) | May 26, 2025 | Jul 11, 2025 | Nov 27, 2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:S/C:P/I:N/A:N)
Published
May 26, 2025
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
This is a minor information leak when running Screen with setuid-root privileges that is found in older Screen versions, as well as in version 5.0.0. The code in screen.c starting at line 849 inspects the resulting SocketPath with root privileges, and provides error messages that allow unprivileged users to deduce information about the path that would otherwise not be available. An easy way to achieve this is by using the SCREENDIR environment variable.
Solution
arch-linux-upgrade-latest
References
- CVE-2025-46804
- https://attackerkb.com/topics/CVE-2025-46804
- URL-https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46804
- URL-https://security.archlinux.org/ASA-202505-1
- URL-https://security.opensuse.org/2025/05/12/screen-security-issues.html
- URL-https://www.openwall.com/lists/oss-security/2025/05/12/1
- CWE-203
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.