ESB-2018.1881 - [UNIX/Linux][Debian] ruby-passenger: Multiple vulnerabilities 2018-06-28

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.1881
                      Debian 8 patches ruby-passenger
                               28 June 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           ruby-passenger
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Provide Misleading Information -- Remote/Unauthenticated
                   Increased Privileges           -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-12029 CVE-2015-7519 

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2018/06/msg00007.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running ruby-passenger check for an updated version of the software
         for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : ruby-passenger
Version        : 4.0.53-1+deb8u1
CVE ID         : CVE-2015-7519 CVE-2018-12029
Debian Bug     : 864651

Two flaws were discovered in ruby-passenger for Ruby Rails and Rack
support that allowed attackers to spoof HTTP headers or exploit a race
condition which made privilege escalation under certain conditions
possible.

CVE-2015-7519
    Remote attackers could spoof headers passed to applications by using
    an underscore character instead of a dash character in an HTTP
    header as demonstrated by an X_User header.

CVE-2018-12029
    A vulnerability was discovered by the Pulse Security team. It was
    exploitable only when running a non-standard
    passenger_instance_registry_dir, via a race condition where after a
    file was created, there was a window in which it could be replaced
    with a symlink before it was chowned via the path and not the file
    descriptor. If the symlink target was to a file which would be
    executed by root such as root's crontab file, then privilege
    escalation was possible. This is now mitigated by using fchown().

For Debian 8 "Jessie", these problems have been fixed in version
4.0.53-1+deb8u1.

We recommend that you upgrade your ruby-passenger packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=iuEn
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=YdYQ
-----END PGP SIGNATURE-----

« Back to bulletins