Описание
seatd-launch in seatd 0.6.x before 0.6.4 allows removing files with escalated privileges when installed setuid root. The attack vector is a user-supplied socket pathname.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 0.7.0-5 |
| esm-apps/jammy | needs-triage | |
| esm-apps/noble | not-affected | 0.7.0-5 |
| jammy | needs-triage | |
| kinetic | ignored | end of life, was needs-triage |
| lunar | not-affected | 0.7.0-5 |
| mantic | not-affected | 0.7.0-5 |
| noble | not-affected | 0.7.0-5 |
| oracular | not-affected | 0.7.0-5 |
| plucky | not-affected | 0.7.0-5 |
Показывать по
EPSS
9.3 Critical
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
seatd-launch in seatd 0.6.x before 0.6.4 allows removing files with escalated privileges when installed setuid root. The attack vector is a user-supplied socket pathname.
seatd-launch in seatd 0.6.x before 0.6.4 allows removing files with es ...
seatd-launch in seatd 0.6.x before 0.6.4 allows removing files with escalated privileges when installed setuid root. The attack vector is a user-supplied socket pathname.
EPSS
9.3 Critical
CVSS2
9.8 Critical
CVSS3