An attacker can bypass the sandboxing of Nasal scripts and arbitrarily write to any file path that the user has permission to modify at the operating-system level.
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "3.4.0-3ubuntu0.1~esm1",
"binary_name": "libsimgear-dev"
},
{
"binary_version": "3.4.0-3ubuntu0.1~esm1",
"binary_name": "libsimgearcore3.4.0v5"
},
{
"binary_version": "3.4.0-3ubuntu0.1~esm1",
"binary_name": "libsimgearscene3.4.0v5"
}
]
}