Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.1881 Debian 8 patches ruby-passenger 28 June 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ruby-passenger Publisher: Debian Operating System: Debian GNU/Linux 8 UNIX variants (UNIX, Linux, OSX) Impact/Access: Provide Misleading Information -- Remote/Unauthenticated Increased Privileges -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2018-12029 CVE-2015-7519 Original Bulletin: https://lists.debian.org/debian-lts-announce/2018/06/msg00007.html Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running ruby-passenger check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : ruby-passenger Version : 4.0.53-1+deb8u1 CVE ID : CVE-2015-7519 CVE-2018-12029 Debian Bug : 864651 Two flaws were discovered in ruby-passenger for Ruby Rails and Rack support that allowed attackers to spoof HTTP headers or exploit a race condition which made privilege escalation under certain conditions possible. CVE-2015-7519 Remote attackers could spoof headers passed to applications by using an underscore character instead of a dash character in an HTTP header as demonstrated by an X_User header. CVE-2018-12029 A vulnerability was discovered by the Pulse Security team. It was exploitable only when running a non-standard passenger_instance_registry_dir, via a race condition where after a file was created, there was a window in which it could be replaced with a symlink before it was chowned via the path and not the file descriptor. If the symlink target was to a file which would be executed by root such as root's crontab file, then privilege escalation was possible. This is now mitigated by using fchown(). For Debian 8 "Jessie", these problems have been fixed in version 4.0.53-1+deb8u1. We recommend that you upgrade your ruby-passenger packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAlsz6AJfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeQSpxAAklv4ej1DCE6ffp3Rztw1IAMTNdMG79pYWYpdas2/oIyNxu8Jq+a+pEXk dgW5eUqGsBJrGUiTqZ8hoEWew+icoYpShG2TI3zSCtjgaQCxFjmcwWNaLlqXKrYU EF7cMp/2CKV0psLSK+JehvdS3t7/31vYvRCBBYr0XxXEnhLnsy1YvBlZYopnfgcI u8mRJxfhurf076DXRjZEcFSY30TYo0qUr65kB9OJdNSbb8rpXJRPFL7AIEIf9A6D W18OGxiQ0vlxbITccc1Z7OzYn+9XnLpUgotExU0A2KcMrNQoRngkdcIFl77aN2CJ LhNL6mWfrVeiFzMMXzZm8REsvTFSF6klLPpBj/eadMeKDCSHP/dr09SB1pK77Zuv jduO4TqbK1bqmmBgh5/pQ7kDEqDswbHkhmnJP0CqO9VhhVk7uCeULVVoq//8Hdxl 1CoaQMc7A6pWod9sLzHWgsUOuYSQRxMHIQRKiNwbYc9L2RvqjVZsFNYjM+mTc+yw Q0NWUo4Hk50XMEc/ydId7cZ7s+LSJLPmQ7k57de6/7WRVBxsca7WtngnBqpyeFD5 dmkFoQJ/8JIS+sro/2FZNIi+apo16cuMmcmPx+S2HLgewXnBVyzpROjzsLc9+EGj QbezCLPz6N9ywZJzh6bD9CzL8NlasseA9HiwhGzb6iae4G3RESo= =iuEn - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWzRUl2aOgq3Tt24GAQjQhg//W2rqWmz8KFBrg8umjeaXVPzck6PgJ79y Tb+P0Zc5Rqu9oAg7WuOpUAiePCxUAJEYZTgLtXnIHKAMyxxYP/2T4JakoPUo0+7K xCSf9pH2j45EPw14TjMah2O+Q7m0zkgJuaY2w6UrzXfmN2mdmdkE5xwMIdo4tbBe TpWfm1MSTiB1WlbP+1Y3yMaNplqgguBq8BRI4041JLJebfAA9U9KwhMz3JZrCGp+ tAbzX392aGsvczEZ4bU8+mcO+lbNzxp50tqpSd7314SIj2oiUfeOkZkhx9gJ4bLw 8SiJuvMsw/Jj2S9hodf1b5a8Rp5c8vFzlTxhv3A15fZg4AvirJ2KSjkvmx1nbr9s qhM8uXkzSLXzfIAsWOoaMdPOMM/xj3Zb7zDsSJiiukUrolFdR8VJS1dIQHyt6c6I IUpGpLre4PsCN33xnFD9bV8ePt7eFzwjAVgOKXCbxFYi2nGAl05e5S7gI2uT9wzw Y8z7C7+blhqqc6txRjD6cG8F6eHHktRO7wT+quQvtbmqRa3WzAz14Vj0AYYoL0uS pIC7rxWli4MEUW7Ze9NRRMhR6iFRomaZA+vqFlzD+U6zLkZ2iFK75dm9AdreJsO2 jzeeGgX020T4JZTYEu7OAHM65QAO2exwN1lbdxDSRxZYUk/SwUDuH6lgJNbn7HdS Vr0vP15MMtQ= =YdYQ -----END PGP SIGNATURE-----