seatd-launch in seatd 0.6.x before 0.6.2 allows privilege escalation because it uses execlp and may be installed setuid root.
References
Link | Resource |
---|---|
https://lists.sr.ht/~kennylevinsen/seatd-announce/%3CGJ2IZQ.HCKS1J0LSI803%40kl.wtf%3E | Mailing List Third Party Advisory |
Configurations
Information
Published : 2021-09-17 14:15
Updated : 2022-07-12 10:42
NVD link : CVE-2021-41387
Mitre link : CVE-2021-41387
JSON object : View
CWE
CWE-426
Untrusted Search Path
Products Affected
seatd_project
- seatd