Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-25643

Опубликовано: 24 фев. 2022
Источник: debian

Описание

seatd-launch in seatd 0.6.x before 0.6.4 allows removing files with escalated privileges when installed setuid root. The attack vector is a user-supplied socket pathname.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
seatdfixed0.6.4-1package

Примечания

  • https://lists.sr.ht/~kennylevinsen/seatd-announce/%3CETEO7R.QG8B1KGD531R1%40kl.wtf%3E

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 4 года назад

seatd-launch in seatd 0.6.x before 0.6.4 allows removing files with escalated privileges when installed setuid root. The attack vector is a user-supplied socket pathname.

CVSS3: 9.8
nvd
почти 4 года назад

seatd-launch in seatd 0.6.x before 0.6.4 allows removing files with escalated privileges when installed setuid root. The attack vector is a user-supplied socket pathname.

CVSS3: 9.8
github
почти 4 года назад

seatd-launch in seatd 0.6.x before 0.6.4 allows removing files with escalated privileges when installed setuid root. The attack vector is a user-supplied socket pathname.