lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 24 Mar 2019 11:02:30 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4415-1] passenger security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4415-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
March 24, 2019                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : passenger
CVE ID         : CVE-2017-16355
Debian Bug     : 884463

An arbitrary file read vulnerability was discovered in passenger, a web
application server. A local user allowed to deploy an application to
passenger, can take advantage of this flaw by creating a symlink from
the REVISION file to an arbitrary file on the system and have its
content displayed through passenger-status.

For the stable distribution (stretch), this problem has been fixed in
version 5.0.30-1+deb9u1.

We recommend that you upgrade your passenger packages.

For the detailed security status of passenger please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/passenger

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=gsgD
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists