seatd is vulnerable to privilege escalation. The vulnerability exists due to the system using execlp whichallows setuid root to be installed.
CPE | Name | Operator | Version |
---|---|---|---|
seatd:edge | eq | 0.5.0-r2 | |
seatd:edge | eq | 0.5.0-r3 | |
seatd:edge | eq | 0.5.0-r0 | |
seatd:edge | eq | 0.4.0-r0 | |
seatd:edge | eq | 0.5.0-r2 | |
seatd:edge | eq | 0.5.0-r3 | |
seatd:edge | eq | 0.5.0-r0 | |
seatd:edge | eq | 0.4.0-r0 |