9.8
CVSSv3

CVE-2022-25643

Published: 24/02/2022 Updated: 08/11/2023
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

seatd-launch in seatd 0.6.x prior to 0.6.4 allows removing files with escalated privileges when installed setuid root. The attack vector is a user-supplied socket pathname.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

seatd project seatd

Vendor Advisories

Debian Bug report logs - #1006308 seatd-launch: CVE-2022-25643 Package: src:seatd; Maintainer for src:seatd is Mark Hindley <leepen@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 23 Feb 2022 07:30:01 UTC Severity: grave Tags: security, upstream Found in version seatd/063-2 Fixed in v ...