Slackware 15 has released new screen packages to address critical security vulnerabilities, identified by SSA:2025-133-01. The updates apply to both Slackware 15.0 and the current development branch. The key improvements include:
- Temporary Mode Restriction: Prevents PTYs from being set to temporary 0666 mode, enhancing security.
- Information Leak Prevention: Addresses file existence test information leaks.
- Signal Handling: Restricts the sending of signals with root privileges from the socket.c file.
More details can be found in the respective CVEs: CVE-2025-46802, CVE-2025-46804, and CVE-2025-46805.
For users looking to download the updated packages, they are available at the following locations:
- Slackware 15.0:
- i586: [screen-4.9.1-i586-1_slack15.0.txz](ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/screen-4.9.1-i586-1_slack15.0.txz)
- x86_64: [screen-4.9.1-x86_64-1_slack15.0.txz](ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/screen-4.9.1-x86_64-1_slack15.0.txz)
- Slackware -current:
- i686: [screen-5.0.1-i686-1.txz](ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/screen-5.0.1-i686-1.txz)
- x86_64: [screen-5.0.1-x86_64-1.txz](ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/screen-5.0.1-x86_64-1.txz)
MD5 Checksums:
- Slackware 15.0 i586: 12659f919fe3c409660c8a05f0c2a88f
- Slackware 15.0 x86_64: b00ec4f846556da49f9359d0f1bb54a7
- Slackware -current i686: 9b146ea9e136300faad8286b58291124
- Slackware -current x86_64: 5dbc1512f1f890739f1f6b1c77895137
Installation Instructions:
To upgrade the package, users can execute the following command as root:
For further information and updates, users are encouraged to visit the Slackware website and explore additional mirror sites for downloads. The Slackware Linux Security Team remains committed to maintaining the integrity and security of the operating system
- Temporary Mode Restriction: Prevents PTYs from being set to temporary 0666 mode, enhancing security.
- Information Leak Prevention: Addresses file existence test information leaks.
- Signal Handling: Restricts the sending of signals with root privileges from the socket.c file.
More details can be found in the respective CVEs: CVE-2025-46802, CVE-2025-46804, and CVE-2025-46805.
For users looking to download the updated packages, they are available at the following locations:
- Slackware 15.0:
- i586: [screen-4.9.1-i586-1_slack15.0.txz](ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/screen-4.9.1-i586-1_slack15.0.txz)
- x86_64: [screen-4.9.1-x86_64-1_slack15.0.txz](ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/screen-4.9.1-x86_64-1_slack15.0.txz)
- Slackware -current:
- i686: [screen-5.0.1-i686-1.txz](ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/screen-5.0.1-i686-1.txz)
- x86_64: [screen-5.0.1-x86_64-1.txz](ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/screen-5.0.1-x86_64-1.txz)
MD5 Checksums:
- Slackware 15.0 i586: 12659f919fe3c409660c8a05f0c2a88f
- Slackware 15.0 x86_64: b00ec4f846556da49f9359d0f1bb54a7
- Slackware -current i686: 9b146ea9e136300faad8286b58291124
- Slackware -current x86_64: 5dbc1512f1f890739f1f6b1c77895137
Installation Instructions:
To upgrade the package, users can execute the following command as root:
bashupgradepkg screen-4.9.1-i586-1_slack15.0.txz
For further information and updates, users are encouraged to visit the Slackware website and explore additional mirror sites for downloads. The Slackware Linux Security Team remains committed to maintaining the integrity and security of the operating system
Screen update for Slackware 15
New screen packages have been released for Slackware 15.0 and -current to address security vulnerabilities:
screen (SSA:2025-133-01)