An attacker can bypass the sandboxing of Nasal scripts and arbitrarily write to any file path that the user has permission to modify at the operating-system level.
References
| Link | Resource |
|---|---|
| https://gitlab.com/flightgear/flightgear/-/commit/ad37afce28083fad7f79467b3ffdead753584358 | Patch |
| https://gitlab.com/flightgear/flightgear/-/issues/3025 | Broken Link |
| https://gitlab.com/flightgear/simgear/-/commit/5bb023647114267141a7610e8f1ca7d6f4f5a5a8 | Patch |
| https://lists.debian.org/debian-lts-announce/2025/01/msg00028.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2025/01/msg00029.html | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-01-28 17:15
Updated : 2025-08-06 19:25
NVD link : CVE-2025-0781
Mitre link : CVE-2025-0781
CVE.ORG link : CVE-2025-0781
JSON object : View
Products Affected
flightgear
- simgear
debian
- debian_linux
CWE
CWE-863
Incorrect Authorization
