SUSE-SU-2018:0262-1

Source
https://www.suse.com/support/update/announcement/2018/suse-su-20180262-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2018:0262-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2018:0262-1
Related
Published
2018-01-29T13:35:28Z
Modified
2018-01-29T13:35:28Z
Summary
Security update for rubygem-passenger
Details

This update for rubygem-passenger fixes several issues.

These security issues were fixed:

  • CVE-2017-16355: When Passenger was running as root it was possible to list the contents of arbitrary files on a system by symlinking a file named REVISION from the application root folder to a file of choice and querying passenger-status --show=xml (bsc#1073255).
  • CVE-2017-1000384: Introduces a new check that logs a vulnerability warning if Passenger is run with root permissions while the directory permissions of (parts of) its root dir allow modifications by non-root users (bsc#1068874).
References

Affected packages

SUSE:Linux Enterprise Module for Containers 12 / rubygem-passenger

Package

Name
rubygem-passenger
Purl
purl:rpm/suse/rubygem-passenger&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0.18-12.5.1

Ecosystem specific

{
    "binaries": [
        {
            "rubygem-passenger": "5.0.18-12.5.1",
            "ruby2.1-rubygem-passenger": "5.0.18-12.5.1",
            "rubygem-passenger-apache2": "5.0.18-12.5.1"
        }
    ]
}