CVE-2022-25643

seatd-launch in seatd 0.6.x before 0.6.4 allows removing files with escalated privileges when installed setuid root. The attack vector is a user-supplied socket pathname.
Configurations

Configuration 1 (hide)

cpe:2.3:a:seatd_project:seatd:*:*:*:*:*:*:*:*

History

08 Nov 2023, 23:15

Type Values Removed Values Added
References
  • () https://github.com/kennylevinsen/seatd/commit/10658dc5439db429af0088295a051c53925a4416 -
  • () https://github.com/kennylevinsen/seatd/commit/7cffe0797fdb17a9c08922339465b1b187394335 -
  • () https://nvd.nist.gov/vuln/detail/CVE-2022-25643 -

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-269 CWE-668

Information

Published : 2022-02-24 15:15

Updated : 2024-02-28 19:09


NVD link : CVE-2022-25643

Mitre link : CVE-2022-25643

CVE.ORG link : CVE-2022-25643


JSON object : View

Products Affected

seatd_project

  • seatd
CWE
CWE-668

Exposure of Resource to Wrong Sphere