seatd-launch in seatd 0.6.x before 0.6.2 allows privilege escalation because it uses execlp and may be installed setuid root.
References
Link | Resource |
---|---|
https://lists.sr.ht/~kennylevinsen/seatd-announce/%3CGJ2IZQ.HCKS1J0LSI803%40kl.wtf%3E | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-09-17 21:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-41387
Mitre link : CVE-2021-41387
CVE.ORG link : CVE-2021-41387
JSON object : View
Products Affected
seatd_project
- seatd
CWE
CWE-426
Untrusted Search Path