CVE-2025-46804
Linux Debian vulnerability analysis and mitigation

Overview

A minor information leak vulnerability was discovered in GNU Screen that affects both version 5.0.0 and older versions when running with setuid-root privileges. The vulnerability was discovered by the SUSE Security Team and publicly disclosed on May 13, 2025. The issue allows unprivileged users to deduce information about paths that would otherwise not be available through error messages (NVD, SUSE Bug).

Technical details

The vulnerability exists in the code that inspects the SocketPath with root privileges in screen.c starting at line 849. When using the SCREENDIR environment variable, the code provides detailed error messages that reveal information about file and directory existence and types. The vulnerability has a CVSS v3.1 Base Score of 3.3 (Low) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N (NVD, Wiz Report).

Impact

The impact of this vulnerability is considered minor, primarily resulting in an information leak that allows unprivileged users to gather intelligence about the filesystem structure and file existence in privileged locations. This could potentially be used as part of a larger attack chain to map out the target system (Wiz Report).

Mitigation and workarounds

The issue has been addressed with patches that modify the error message handling to only output generic error messages when Screen is installed setuid-root and when the target path is not controlled by the real UID of the process. Additionally, it is recommended not to install Screen with setuid-root privileges at all, or to restrict the multi-user feature to trusted groups only (Openwall).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22776HIGH8.7
  • Linux DebianLinux Debian
  • cpp-httplib
NoNoJan 12, 2026
CVE-2026-22801MEDIUM6.8
  • OpenJDK JDKOpenJDK JDK
  • java-21-openjdk-demo-fastdebug
NoYesJan 12, 2026
CVE-2026-22695MEDIUM6.1
  • OpenJDK JDKOpenJDK JDK
  • java-25-openjdk-static-libs
NoYesJan 12, 2026
CVE-2026-22251MEDIUM5.3
  • PythonPython
  • wlc
NoYesJan 12, 2026
CVE-2026-0665N/AN/A
  • Linux DebianLinux Debian
  • qemu
NoNoJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management