seatd-launch in seatd 0.6.x before 0.6.4 allows removing files with escalated privileges when installed setuid root. The attack vector is a user-supplied socket pathname.
{ "binaries": [ { "binary_version": "0.6.4-1", "binary_name": "libseat-dev" }, { "binary_version": "0.6.4-1", "binary_name": "libseat1" }, { "binary_version": "0.6.4-1", "binary_name": "seatd" } ] }