It was discovered that GNU Screen was not properly checking user identifiers before sending certain signals to target processes. If GNU Screen was installed as setuid or setgid, a local attacker could possibly use this issue to cause a denial of service on a target application.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_name": "screen", "binary_version": "4.1.0~20120320gitdb59704-9ubuntu0.1~esm3" }, { "binary_name": "screen-dbg", "binary_version": "4.1.0~20120320gitdb59704-9ubuntu0.1~esm3" }, { "binary_name": "screen-dbgsym", "binary_version": "4.1.0~20120320gitdb59704-9ubuntu0.1~esm3" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_name": "screen", "binary_version": "4.3.1-2ubuntu0.1+esm1" }, { "binary_name": "screen-dbg", "binary_version": "4.3.1-2ubuntu0.1+esm1" }, { "binary_name": "screen-dbgsym", "binary_version": "4.3.1-2ubuntu0.1+esm1" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_name": "screen", "binary_version": "4.6.2-1ubuntu1.1+esm1" }, { "binary_name": "screen-dbgsym", "binary_version": "4.6.2-1ubuntu1.1+esm1" }, { "binary_name": "screen-udeb", "binary_version": "4.6.2-1ubuntu1.1+esm1" } ] }