| Summary: | screen new security issue CVE-2023-24626 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | andrewsfarm, brtians1, geiger.david68210, nicolas.salguero, sysadmin-bugs |
| Version: | 9 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA9-64-OK | ||
| Source RPM: | screen-4.9.0-4.mga9.src.rpm | CVE: | CVE-2023-24626 |
| Status comment: | |||
|
Description
David Walser
2023-07-05 23:08:14 CEST
No obvious packager for this, so assigning globally. CC'ing DavidG, but it is years since he dealt with it. Assignee:
bugsquad =>
pkg-bugs Suggested advisory: ======================== The updated package fixes a security vulnerability: socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process. (CVE-2023-24626) References: https://ubuntu.com/security/notices/USN-6198-1 ======================== Updated package in core/updates_testing: ======================== screen-4.9.0-4.1.mga9 from SRPM: screen-4.9.0-4.1.mga9.src.rpm CC:
(none) =>
nicolas.salguero
katnatek
2024-03-12 21:58:28 CET
Keywords:
(none) =>
advisory RH mageia 9 x86_64
LC_ALL=C urpmi --auto --auto-update
medium "QA Testing (32-bit)" is up-to-date
medium "QA Testing (64-bit)" is up-to-date
medium "Core Release (distrib1)" is up-to-date
medium "Core Updates (distrib3)" is up-to-date
medium "Nonfree Release (distrib11)" is up-to-date
medium "Nonfree Updates (distrib13)" is up-to-date
medium "Tainted Release (distrib21)" is up-to-date
medium "Tainted Updates (distrib23)" is up-to-date
medium "Core 32bit Release (distrib31)" is up-to-date
medium "Core 32bit Updates (distrib32)" is up-to-date
medium "Nonfree 32bit Release (distrib36)" is up-to-date
medium "Tainted 32bit Release (distrib41)" is up-to-date
medium "Tainted 32bit Updates (distrib42)" is up-to-date
installing screen-4.9.0-4.1.mga9.x86_64.rpm from //home/katnatek/qa-testing/x86_64
Preparing... ##################################################################################################
1/1: screen ##################################################################################################
1/1: removing screen-4.9.0-4.mga9.x86_64
##################################################################################################
use screen to run a script without issues, screen have capacities that I don't use, so this is all the test I can do
Installed basic testing completed. It appears to work, though the version reported from screen seems out dated. CC:
(none) =>
brtians1 Validating. Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2024-0057.html Status:
ASSIGNED =>
RESOLVED |