seatd-launch in seatd 0.6.x before 0.6.4 allows removing files with escalated privileges when installed setuid root. The attack vector is a user-supplied socket pathname.
[
{
"id": "CVE-2022-25643-20b28f98",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"62883726330063925292959293215789704425",
"39333791285992616658521980421219006655",
"334191234334548614446221313768525467332",
"245329870335235198700542873439017283392",
"205616032534890444612541076778068273826",
"328730271151717473539494469057975192779",
"185590913253645518958966357839448166418",
"154256192354667556565811148126360626961",
"324546817450199795223853431018938717776",
"36304462118301466837806222170501076990",
"166097240514222773733488022391475693218",
"152228686696997748542766862074084131246",
"257224412124868485622357987664179224547",
"34526154519265002525877201020641257408",
"255427057108738170372119395617641689291",
"56540596929896550175765095402962770880",
"298868048499205066983765272609542696134",
"230175880307342141042659713586611653872",
"52519289679802340916109617257507968989"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://github.com/kennylevinsen/seatd/commit/10658dc5439db429af0088295a051c53925a4416",
"target": {
"file": "seatd-launch/seatd-launch.c"
}
},
{
"id": "CVE-2022-25643-58580dc1",
"signature_version": "v1",
"digest": {
"length": 3875.0,
"function_hash": "307218132424454286505371387300280139909"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://github.com/kennylevinsen/seatd/commit/7cffe0797fdb17a9c08922339465b1b187394335",
"target": {
"file": "seatd-launch/seatd-launch.c",
"function": "main"
}
},
{
"id": "CVE-2022-25643-6040f219",
"signature_version": "v1",
"digest": {
"length": 3763.0,
"function_hash": "106968009914228725579696027296241171281"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://github.com/kennylevinsen/seatd/commit/10658dc5439db429af0088295a051c53925a4416",
"target": {
"file": "seatd-launch/seatd-launch.c",
"function": "main"
}
},
{
"id": "CVE-2022-25643-d37dbebf",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"62883726330063925292959293215789704425",
"39333791285992616658521980421219006655",
"334191234334548614446221313768525467332",
"245329870335235198700542873439017283392",
"205616032534890444612541076778068273826",
"328730271151717473539494469057975192779",
"185590913253645518958966357839448166418",
"154256192354667556565811148126360626961",
"324546817450199795223853431018938717776",
"36304462118301466837806222170501076990",
"166097240514222773733488022391475693218",
"152228686696997748542766862074084131246",
"257224412124868485622357987664179224547",
"34526154519265002525877201020641257408",
"255427057108738170372119395617641689291",
"56540596929896550175765095402962770880",
"162110539219312074074663094958733623347",
"46790672917149404035535454117634074126",
"147956451304967070187777787725505218215"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://github.com/kennylevinsen/seatd/commit/7cffe0797fdb17a9c08922339465b1b187394335",
"target": {
"file": "seatd-launch/seatd-launch.c"
}
}
]