Bug 2185517 (CVE-2023-24626)

Summary: CVE-2023-24626 screen: allows sending SIGHUP to arbitrary PIDs
Product: [Other] Security Response Reporter: Avinash Hanwate <ahanwate>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jburrell, jridky, ovasik
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in screen. This flaw allows local users to send a SIGHUP signal to any PID due to a missing signal sending permission check, potentially resulting in a denial of service or disruption of the target process.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2185521, 2185518, 2186312    
Bug Blocks: 2185522    

Description Avinash Hanwate 2023-04-10 06:10:37 UTC
socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process.

https://git.savannah.gnu.org/cgit/screen.git/patch/?id=e9ad41bfedb4537a6f0de20f00b27c7739f168f7
https://www.exploit-db.com/exploits/51252
https://savannah.gnu.org/bugs/?63195

Comment 1 Avinash Hanwate 2023-04-10 06:11:19 UTC
Created screen tracking bugs for this issue:

Affects: fedora-all [bug 2185518]

Comment 2 Avinash Hanwate 2023-04-10 06:27:28 UTC
Created screen tracking bugs for this issue:

Affects: epel-8 [bug 2185521]