An attacker can bypass the sandboxing of Nasal scripts and arbitrarily write to any file path that the user has permission to modify at the operating-system level.
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "libsimgear-dev",
"binary_version": "3.4.0-3ubuntu0.1~esm1"
},
{
"binary_name": "libsimgearcore3.4.0v5",
"binary_version": "3.4.0-3ubuntu0.1~esm1"
},
{
"binary_name": "libsimgearscene3.4.0v5",
"binary_version": "3.4.0-3ubuntu0.1~esm1"
}
]
}