{"id":"CVE-2023-46277","details":"please (aka pleaser) through 0.5.4 allows privilege escalation through the TIOCSTI and/or TIOCLINUX ioctl. (If both TIOCSTI and TIOCLINUX are disabled, this cannot be exploited.)","aliases":["GHSA-cgf8-h3fp-h956","RUSTSEC-2023-0066"],"modified":"2026-03-14T12:21:30.702752Z","published":"2023-10-20T05:15:08.487Z","references":[{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2023-0066.html"},{"type":"REPORT","url":"https://gitlab.com/edneville/please/-/issues/13"},{"type":"FIX","url":"https://gitlab.com/edneville/please/-/merge_requests/69#note_1594254575"},{"type":"FIX","url":"https://github.com/rustsec/advisory-db/pull/1798"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/edneville/please","events":[{"introduced":"0"},{"last_affected":"68c82e4be33f52a6fc4444fd28539e11d47d0602"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.5.4"}]}}],"versions":["v0.3.0","v0.3.16","v0.3.17","v0.3.18","v0.3.19","v0.3.20","v0.3.21","v0.3.22","v0.3.23","v0.3.24","v0.3.25","v0.3.3","v0.4.0","v0.4.1","v0.4.2","v0.5.0","v0.5.1","v0.5.2","v0.5.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-46277.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}