oss-sec mailing list archives
Re: Re: CVE request: temporary file issue in Passenger rubygem
From: Tomas Hoger <thoger () redhat com>
Date: Mon, 3 Feb 2014 14:59:48 +0100
On Thu, 30 Jan 2014 09:26:33 -0500 (EST) cve-assign () mitre org wrote:
If a local attacker can predict this filename, and precreates a symlink with the same filename that points to an arbitrary directory with mode 755, owner root and group root, then the attacker will succeed in making Phusion Passenger write files and create subdirectories inside that target directory. It is fixed in upstream version 4.0.33. https://github.com/phusion/passenger/commit/34b1087870c2bf85ebfd72c30b78577e10ab9744
...
Use CVE-2014-1831 for the vulnerability with the "before 4.0.33" affected versions. Use CVE-2014-1832 for the vulnerability with the "4.0.33 and earlier" affected versions.
Note that while the original CVE request mentions version 4.0.33, that seems like a typo as upstream NEWS file indicates: Fixed versions: 4.0.37. Consequently, the above should be "before 4.0.37" and "4.0.37 and earlier" (or "before 4.0.38"). -- Tomas Hoger / Red Hat Security Response Team
Current thread:
- CVE request: temporary file issue in Passenger rubygem Vincent Danen (Jan 28)
- Re: CVE request: temporary file issue in Passenger rubygem Raphael Geissert (Jan 29)
- Re: CVE request: temporary file issue in Passenger rubygem Raphael Geissert (Jan 29)
- Re: CVE request: temporary file issue in Passenger rubygem cve-assign (Jan 30)
- Re: Re: CVE request: temporary file issue in Passenger rubygem Tomas Hoger (Feb 03)
- Re: CVE request: temporary file issue in Passenger rubygem Raphael Geissert (Jan 29)