A flaw was found in katello-debug before 3.4.0 where certain scripts and log files used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2018:0336 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9595 | Issue Tracking Patch Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:0336 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9595 | Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2018:0336 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9595 - Issue Tracking, Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 3.6
v3 : 7.3 |
Information
Published : 2018-07-27 18:29
Updated : 2024-11-21 03:01
NVD link : CVE-2016-9595
Mitre link : CVE-2016-9595
CVE.ORG link : CVE-2016-9595
JSON object : View
Products Affected
redhat
- satellite_capsule
- satellite
theforeman
- katello