(no title)
RMPR | 9 months ago
> Screen offers a multi-user mode which allows to attach to Screen sessions owned by other users in the system (given the proper credentials). These multi-user features are only available when Screen is installed with the setuid-root bit set. This configuration of Screen results in highly increased attack surface, because of the complex Screen code that runs with root privileges in this case
I wasn't aware of such a feature but I guess it's what makes stuff like tmate possible. Speaking of which, I wonder if tmux is affected by the same kind of vulnerability.
dooglius|9 months ago
EDIT: Further down, TFA gives a plausible explanation: the current screen devs are not fully familiar with the code base. If so, the setuid-root approach was probably the easiest way to make the feature work in lieu of such familiarity.
JdeBP|9 months ago
https://sources.vsta.org/comp.sources.unix/volume10/screen/
chasil|9 months ago
CVE-2025-46802 can impact earlier releases, but all the other vulnerabilities are for the latest.
account42|9 months ago
fzzzy|9 months ago
unknown|9 months ago
[deleted]
fullstop|9 months ago
thanatos519|9 months ago
Not surprised to hear it's full of security holes. :)
cess11|9 months ago
https://superuser.com/questions/188501/is-there-a-way-to-hav...
Use groups instead of chmod 777.
trollied|9 months ago
qwertox|9 months ago
unknown|9 months ago
[deleted]