Summary: | games-simulation/flightgear: Sandbox bypass in Nasal scripts | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | IN_PROGRESS --- | ||
Severity: | normal | CC: | games, reavertm |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B3 [ebuild] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 951572 | ||
Bug Blocks: |
Description
Sam James
![]() ![]() ![]() ![]() "An attacker can bypass the sandboxing of Nasal scripts and arbitrarily write to any file path that the user has permission to modify at the operating-system level." |