An attacker can bypass the sandboxing of Nasal scripts and arbitrarily write to any file path that the user has permission to modify at the operating-system level.
Solution:
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://gitlab.com/flightgear/simgear/-/commit/5bb023647114267141a7610e8f1ca7d6f4f5a5a8 | patch |
https://gitlab.com/flightgear/flightgear/-/commit/ad37afce28083fad7f79467b3ffdead753584358 | patch |
https://gitlab.com/flightgear/flightgear/-/issues/3025 | issue tracking broken link permissions required |
https://lists.debian.org/debian-lts-announce/2025/01/msg00028.html | mailing list third party advisory |
https://lists.debian.org/debian-lts-announce/2025/01/msg00029.html | mailing list third party advisory |