seatd-launch in seatd 0.6.x before 0.6.2 allows privilege escalation because it uses execlp and may be installed setuid root.
References
Link | Resource |
---|---|
https://lists.sr.ht/~kennylevinsen/seatd-announce/%3CGJ2IZQ.HCKS1J0LSI803%40kl.wtf%3E | Mailing List Third Party Advisory |
https://lists.sr.ht/~kennylevinsen/seatd-announce/%3CGJ2IZQ.HCKS1J0LSI803%40kl.wtf%3E | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 06:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.sr.ht/~kennylevinsen/seatd-announce/%3CGJ2IZQ.HCKS1J0LSI803%40kl.wtf%3E - Mailing List, Third Party Advisory |
Information
Published : 2021-09-17 21:15
Updated : 2024-11-21 06:26
NVD link : CVE-2021-41387
Mitre link : CVE-2021-41387
CVE.ORG link : CVE-2021-41387
JSON object : View
Products Affected
seatd_project
- seatd
CWE
CWE-426
Untrusted Search Path