{"id":"CVE-2016-9595","details":"A flaw was found in katello-debug before 3.4.0 where certain scripts and log files used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files.","modified":"2026-03-14T09:21:03.409317Z","published":"2018-07-27T18:29:00.237Z","references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0336"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9595"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/katello/katello","events":[{"introduced":"0"},{"fixed":"600b173da31275e2b6852faf0dd59feb1d2fdb8f"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.4.0"}]}}],"versions":["2.4.0-RC1","3.4.0.rc2","katello-1.4.2-1","katello-1.4.3-1","katello-1.4.4-1","katello-1.4.5-1","katello-1.4.6-1","katello-1.4.7-1","katello-1.4.8-1","katello-1.4.9-1","katello-1.5.0-12","katello-1.5.0-13","katello-1.5.0-14","katello-1.5.1-1","katello-2.0.0-0","katello-2.1.0-1","katello-2.2.0-1","katello-2.3.0-1","rubygem-katello-1.5.0-10","rubygem-katello-1.5.0-11","rubygem-katello-1.5.0-12","rubygem-katello-1.5.0-9","rubygem-katello-2.0.0-1","rubygem-katello-2.1.0-1","rubygem-katello-2.2.0-1","rubygem-katello-2.2.0-2","rubygem-katello-2.3.0-1","rubygem-katello-2.3.0-2","rubygem-katello-2.4.0-1","rubygem-katello-2.4.0-2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9595.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"6.3"}]},{"events":[{"introduced":"0"},{"last_affected":"6.3"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}]}