An authenticated attacker can use this vulnerability to...
High severity
Unreviewed
Published
Jan 14, 2025
to the GitHub Advisory Database
•
Updated Jan 14, 2025
Description
Published by the National Vulnerability Database
Jan 14, 2025
Published to the GitHub Advisory Database
Jan 14, 2025
Last updated
Jan 14, 2025
An authenticated attacker can use this vulnerability to perform a privilege escalation to gain root access.
References