Update

USN-7978-1: GNU Screen vulnerabilities

USN-7978-1: GNU Screen vulnerabilities
Publication date: 26 January 2026
Overview: Several security issues were fixed in GNU Screen.

Packages
screen - terminal multiplexer with VT100/ANSI terminal emulation

Details
It was discovered that GNU Screen incorrectly handled signals when setuid
or setgid privileges were being used, which is not the default in Ubuntu.
A local attacker could use this issue to send privileged signals, possibly
leading to a denial of service. This issue only affected Ubuntu 22.04 LTS.
(CVE-2023-24626)

It was discovered that GNU Screen incorrectly handled PTY permissions. A
local attacker could possibly use this issue to connect to an unauthorized
screen session. (CVE-2025-46802)

It was discovered that GNU Screen incorrectly handled file access when
setuid privileges were being used, which is not the default in Ubuntu. A
local attacker could use this issue to deduce information about certain
file paths. (CVE-2025-46804)

It was discovered that GNU Screen incorrectly handled signals when setuid
privileges were being used, which is not the default in Ubuntu. A local
attacker could use this issue to send privileged signals, possibly leading
to a denial of service. (CVE-2025-46805)

Update instructions
In general, a standard system update will make all the necessary changes.

The problem can be corrected by updating your system to the following package versions:

  • 24.04 LTS noble screen – 4.9.1-1ubuntu1
  • 22.04 LTS jammy screen – 4.9.0-1ubuntu0.1
The manufacturer Canonical has not yet set up its devicebase profile. Content such as updates, compatibilities and support may only be maintained with a delay.
Receive Important Update Messages Stay tuned for upcoming Canonical updates

Was the content helpful to you?

Advertisement Advertise here?
Udemy IT certification ad