An attacker can bypass the sandboxing of Nasal scripts and arbitrarily write to any file path that the user has permission to modify at the operating-system level.
{ "binaries": [ { "binary_name": "flightgear", "binary_version": "3.4.0-3ubuntu1.1" } ] }
{ "binaries": [ { "binary_name": "libsimgear-dev", "binary_version": "3.4.0-3" }, { "binary_name": "libsimgearcore3.4.0v5", "binary_version": "3.4.0-3" }, { "binary_name": "libsimgearscene3.4.0v5", "binary_version": "3.4.0-3" } ] }
{ "binaries": [ { "binary_name": "flightgear", "binary_version": "1:2018.1.1+dfsg-1" } ] }
{ "binaries": [ { "binary_name": "libsimgear-dev", "binary_version": "1:2018.1.1+dfsg-1" } ] }
{ "binaries": [ { "binary_name": "flightgear", "binary_version": "1:2019.1.1+dfsg-2" } ] }
{ "binaries": [ { "binary_name": "libsimgear-dev", "binary_version": "1:2019.1.1+dfsg-3" } ] }
{ "binaries": [ { "binary_name": "flightgear", "binary_version": "1:2020.3.6+dfsg-1build1" } ] }
{ "binaries": [ { "binary_name": "libsimgear-dev", "binary_version": "1:2020.3.6+dfsg-1" } ] }
{ "binaries": [ { "binary_name": "flightgear", "binary_version": "1:2020.3.18+dfsg-1.1" } ] }
{ "binaries": [ { "binary_name": "libsimgear-dev", "binary_version": "1:2020.3.18+dfsg-2.1" } ] }