First published: Wed Dec 21 2016(Updated: )
A flaw was found in katello-debug before 3.4.0 where certain scripts and log files used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/katello | <3.4.0 | 3.4.0 |
Katello | <3.4.0 | |
Red Hat Satellite | =6.3 | |
Red Hat Satellite | =6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9595 has a moderate severity rating due to the potential for local users to exploit the vulnerability.
To fix CVE-2016-9595, upgrade katello to version 3.4.0 or later.
CVE-2016-9595 is associated with a symbolic-link attack that allows local users to overwrite arbitrary files.
CVE-2016-9595 affects katello versions prior to 3.4.0 and Red Hat Satellite and Capsule versions 6.3.
CVE-2016-9595 was reported by Evgeni Golov of Red Hat.