UBUNTU-CVE-2025-46804

Source
https://ubuntu.com/security/CVE-2025-46804
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-46804.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2025-46804
Related
Published
2025-05-08T00:00:00Z
Modified
2025-06-03T18:01:28Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

A minor information leak when running Screen with setuid-root privileges allows unprivileged users to deduce information about a path that would otherwise not be available. Affected are older Screen versions, as well as version 5.0.0.

References

Affected packages

Ubuntu:Pro:14.04:LTS / screen

Package

Name
screen
Purl
pkg:deb/ubuntu/screen@4.1.0~20120320gitdb59704-9ubuntu0.1~esm3?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.0.3-14ubuntu10
4.1.0~20120320gitdb59704-9
4.1.0~20120320gitdb59704-9ubuntu0.1~esm1
4.1.0~20120320gitdb59704-9ubuntu0.1~esm2
4.1.0~20120320gitdb59704-9ubuntu0.1~esm3

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Per reporter, this is a minor information leak"
}

Ubuntu:Pro:16.04:LTS / screen

Package

Name
screen
Purl
pkg:deb/ubuntu/screen@4.3.1-2ubuntu0.1+esm1?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.3.1-2
4.3.1-2build1
4.3.1-2ubuntu0.1
4.3.1-2ubuntu0.1+esm1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Per reporter, this is a minor information leak"
}

Ubuntu:Pro:18.04:LTS / screen

Package

Name
screen
Purl
pkg:deb/ubuntu/screen@4.6.2-1ubuntu1.1+esm1?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.6.1-1
4.6.2-1
4.6.2-1ubuntu1
4.6.2-1ubuntu1.1
4.6.2-1ubuntu1.1+esm1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Per reporter, this is a minor information leak"
}

Ubuntu:Pro:20.04:LTS / screen

Package

Name
screen
Purl
pkg:deb/ubuntu/screen@4.8.0-1ubuntu0.1?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.6.2-3build1
4.7.0-1
4.8.0-1
4.8.0-1ubuntu0.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Per reporter, this is a minor information leak"
}

Ubuntu:22.04:LTS / screen

Package

Name
screen
Purl
pkg:deb/ubuntu/screen@4.9.0-1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.8.0-6
4.8.0-6build1
4.8.0-7
4.9.0-1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Per reporter, this is a minor information leak"
}

Ubuntu:24.10 / screen

Package

Name
screen
Purl
pkg:deb/ubuntu/screen@4.9.1-1build1?arch=source&distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.9.1-1build1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Per reporter, this is a minor information leak"
}

Ubuntu:24.04:LTS / screen

Package

Name
screen
Purl
pkg:deb/ubuntu/screen@4.9.1-1build1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.9.0-4
4.9.1-1
4.9.1-1build1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Per reporter, this is a minor information leak"
}

Ubuntu:25.04 / screen

Package

Name
screen
Purl
pkg:deb/ubuntu/screen@4.9.1-1build1?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.9.1-1build1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Per reporter, this is a minor information leak"
}