{"containers":{"cna":{"affected":[{"product":"instack-undercloud","vendor":"Red Hat, Inc.","versions":[{"status":"affected","version":"Pike, 12: v7.2.0, Ocata, 11: v6.1.0, Newton, 10: v5.3.0"}]}],"datePublic":"2017-08-14T00:00:00.000Z","descriptions":[{"lang":"en","value":"A flaw was found in instack-undercloud 7.2.0 as packaged in Red Hat OpenStack Platform Pike, 6.1.0 as packaged in Red Hat OpenStack Platform Oacta, 5.3.0 as packaged in Red Hat OpenStack Newton, where pre-install and security policy scripts used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-377","description":"CWE-377","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2018-01-04T19:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"RHSA-2017:2726","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2017:2726"},{"name":"100407","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/100407"},{"name":"RHSA-2017:2649","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2017:2649"},{"name":"RHSA-2017:2687","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2017:2687"},{"name":"RHSA-2017:2557","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2017:2557"},{"name":"RHSA-2017:2693","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2017:2693"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1477403"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T16:04:12.059Z"},"title":"CVE Program Container","references":[{"name":"RHSA-2017:2726","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2017:2726"},{"name":"100407","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/100407"},{"name":"RHSA-2017:2649","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2017:2649"},{"name":"RHSA-2017:2687","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2017:2687"},{"name":"RHSA-2017:2557","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2017:2557"},{"name":"RHSA-2017:2693","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2017:2693"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1477403"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2017-7549","dateReserved":"2017-04-05T00:00:00.000Z","dateUpdated":"2024-08-05T16:04:12.059Z","state":"PUBLISHED","datePublished":"2017-09-21T20:00:00.000Z"},"dataType":"CVE_RECORD","dataVersion":"5.1"}