CVE-2025-23395

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-23395
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-23395.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-23395
Published
2025-05-26T16:15:20Z
Modified
2025-05-30T21:05:29.460150Z
Summary
[none]
Details

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with root ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges

References

Affected packages

Alpine:v3.21 / screen

Package

Name
screen
Purl
pkg:apk/alpine/screen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0.1-r0

Affected versions

4.*

4.0.3-r0
4.0.3-r1
4.0.3-r2
4.0.3-r3
4.0.3-r4
4.2.1-r0
4.2.1-r1
4.2.1-r2
4.2.1-r3
4.3.1-r0
4.3.1-r1
4.3.1-r2
4.3.1-r3
4.3.1-r4
4.4.0-r0
4.5.0-r0
4.5.1-r0
4.5.1-r1
4.6.0-r0
4.6.1-r0
4.6.1-r1
4.6.2-r0
4.7.0-r0
4.8.0-r0
4.8.0-r1
4.8.0-r2
4.8.0-r3
4.8.0-r4
4.8.0-r5
4.8.0-r6
4.9.0-r0
4.9.0-r1
4.9.0-r2
4.9.0-r3
4.9.0-r4
4.9.0-r5
4.9.1-r0
4.9.1-r1
4.9.1-r2

5.*

5.0.0-r0

Alpine:v3.22 / screen

Package

Name
screen
Purl
pkg:apk/alpine/screen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0.1-r0

Affected versions

4.*

4.0.3-r0
4.0.3-r1
4.0.3-r2
4.0.3-r3
4.0.3-r4
4.2.1-r0
4.2.1-r1
4.2.1-r2
4.2.1-r3
4.3.1-r0
4.3.1-r1
4.3.1-r2
4.3.1-r3
4.3.1-r4
4.4.0-r0
4.5.0-r0
4.5.1-r0
4.5.1-r1
4.6.0-r0
4.6.1-r0
4.6.1-r1
4.6.2-r0
4.7.0-r0
4.8.0-r0
4.8.0-r1
4.8.0-r2
4.8.0-r3
4.8.0-r4
4.8.0-r5
4.8.0-r6
4.9.0-r0
4.9.0-r1
4.9.0-r2
4.9.0-r3
4.9.0-r4
4.9.0-r5
4.9.1-r0
4.9.1-r1
4.9.1-r2

5.*

5.0.0-r0