Skip to content
seatd 0.6.4

This release contains a security fix for a vulnerability in the
seatd-launch executable.

A user could specify a socket path that collides with an existing file.
If seatd-launch had the SUID bit set and was owned by a privileged user,
this could be used to remove files that the calling user itself did not
have sufficient privileges to remove.

seatd and libseat are not affected by this vulnerability.

Kenny Levinsen (3):
      seatd-launch: Remove socket path command line arg
      seatd-launch: Use snprintf for socket path
      Bump version to 0.6.4