File _patchinfo of Package patchinfo.6150
<patchinfo incident="6150">
<issue id="1068874" tracker="bnc">VUL-0: CVE-2017-1000384: rubygem-passenger: Arbitrary file read vulnerability</issue>
<issue id="1073255" tracker="bnc">VUL-1: CVE-2017-16355: rubygem-passenger: agent/Core/SpawningKit/Spawner.h, if Passenger isrunning as root, allows for arbitrary file reads in certain configurations</issue>
<issue id="2017-16355" tracker="cve" />
<issue id="2017-1000384" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>schubi2</packager>
<description>This update for rubygem-passenger fixes several issues.
These security issues were fixed:
- CVE-2017-16355: When Passenger was running as root it was possible to list
the contents of arbitrary files on a system by symlinking a file named REVISION
from the application root folder to a file of choice and querying
passenger-status --show=xml (bsc#1073255).
- CVE-2017-1000384: Introduces a new check that logs a vulnerability warning if Passenger is run
with root permissions while the directory permissions of (parts of) its root dir allow
modifications by non-root users (bsc#1068874).
</description>
<summary>Security update for rubygem-passenger</summary>
</patchinfo>