It was discovered that GNU Screen was not properly checking user identifiers before sending certain signals to target processes. If GNU Screen was installed as setuid or setgid, a local attacker could possibly use this issue to cause a denial of service on a target application.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "4.1.0~20120320gitdb59704-9ubuntu0.1~esm3", "binary_name": "screen" }, { "binary_version": "4.1.0~20120320gitdb59704-9ubuntu0.1~esm3", "binary_name": "screen-dbg" }, { "binary_version": "4.1.0~20120320gitdb59704-9ubuntu0.1~esm3", "binary_name": "screen-dbgsym" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "4.3.1-2ubuntu0.1+esm1", "binary_name": "screen" }, { "binary_version": "4.3.1-2ubuntu0.1+esm1", "binary_name": "screen-dbg" }, { "binary_version": "4.3.1-2ubuntu0.1+esm1", "binary_name": "screen-dbgsym" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "4.6.2-1ubuntu1.1+esm1", "binary_name": "screen" }, { "binary_version": "4.6.2-1ubuntu1.1+esm1", "binary_name": "screen-dbgsym" }, { "binary_version": "4.6.2-1ubuntu1.1+esm1", "binary_name": "screen-udeb" } ] }