[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 4415-1] passenger security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4415-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
March 24, 2019                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : passenger
CVE ID         : CVE-2017-16355
Debian Bug     : 884463

An arbitrary file read vulnerability was discovered in passenger, a web
application server. A local user allowed to deploy an application to
passenger, can take advantage of this flaw by creating a symlink from
the REVISION file to an arbitrary file on the system and have its
content displayed through passenger-status.

For the stable distribution (stretch), this problem has been fixed in
version 5.0.30-1+deb9u1.

We recommend that you upgrade your passenger packages.

For the detailed security status of passenger please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/passenger

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlyXY69fFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0R70g//eQOENnft2PrdGs/wb3roVULaENGCw/TGuGHZXJzIf49xEJ2/+ad4WGt5
rVwB0hHtwI6bwH0bb7cZNHYpVNBNb2ze8T5euYleQqfKZM5VSfx7xscmAaiWhxiW
W5p1P6doUISxD3W0uQ0Q/WNvEsERoHcHAmZF9VfW6j8gEqkEA6lizkUVxxmvKBdD
EZQ0iOwJ2PtcLpWSJXJArbso2ImUaVCEIgjpI1wfVTV0aU7OpTqiUYpKEx0hnmR7
gSH+mOT6Y52Jd/puXzEFhbzTZwU5cTYXJvLIWiSlx67B7Mg4PYOUNRHoF9TJbFpE
hapM1SnO7TYu4SuEs57uS3cWZqh/ZaayG7E4m69Jf/mYrwpoCeAq/DOTxybZpXtL
fNX/jSv5Tuwa+L4DPmD0xGyl1PAah5bZ2cIisEK9LgwXdXaezy4IArT9hDSZFfaI
z4qmV6LNIBmKNe93xEhSgPcD5B8NhM4WWcizdSNjBFgc2EF1pELa9MhlomEacR/f
fuNqqptZ+VbgkmqAsGEeVJj94RvtZ5PeTfinVEbZmhsGT8QTl+0oRuMxnw6bo53e
Za+ulSpv6s0UAlwTY/DqhNnzsPzUztnlDA5SeGWz2L2RZE5ZrrSMmDthC0brAjJS
3vqPc0XNXH6jDOV+SE6LJ68mIPrflV14ofuYa5cCzEGr+xKNCgg=
=gsgD
-----END PGP SIGNATURE-----


Reply to: