The replay-sorcery program in ReplaySorcery 0.4.0 through 0.5.0, when using the default setuid-root configuration, allows a local attacker to escalate privileges to root by specifying video output paths in privileged locations.
References
Link Resource
http://www.openwall.com/lists/oss-security/2021/02/10/1 Exploit Mailing List Patch Third Party Advisory
https://github.com/matanui159/ReplaySorcery/releases Release Notes Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2021-02-10T17:53:59

Updated: 2021-02-10T17:53:59

Reserved: 2021-02-09T00:00:00


Link: CVE-2021-26936

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-02-10T18:15:13.017

Modified: 2021-02-16T20:36:56.207


Link: CVE-2021-26936

JSON object: View

cve-icon Redhat Information

No data.

CWE