LAYER: meta PACKAGE NAME: seatd PACKAGE VERSION: 0.8.0 CVE: CVE-2021-41387 CVE STATUS: Patched CVE SUMMARY: seatd-launch in seatd 0.6.x before 0.6.2 allows privilege escalation because it uses execlp and may be installed setuid root. CVSS v2 BASE SCORE: 8.5 CVSS v3 BASE SCORE: 8.8 VECTOR: NETWORK VECTORSTRING: AV:N/AC:M/Au:S/C:C/I:C/A:C MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2021-41387 LAYER: meta PACKAGE NAME: seatd PACKAGE VERSION: 0.8.0 CVE: CVE-2022-25643 CVE STATUS: Patched CVE SUMMARY: seatd-launch in seatd 0.6.x before 0.6.4 allows removing files with escalated privileges when installed setuid root. The attack vector is a user-supplied socket pathname. CVSS v2 BASE SCORE: 9.3 CVSS v3 BASE SCORE: 9.8 VECTOR: NETWORK VECTORSTRING: AV:N/AC:M/Au:N/C:C/I:C/A:C MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2022-25643