Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 499904 (CVE-2014-1832) - <www-apache/passenger-4.0.37 : Directory Creation Race Condition Security Issue (CVE-2014-1832)
Summary: <www-apache/passenger-4.0.37 : Directory Creation Race Condition Security Iss...
Status: RESOLVED FIXED
Alias: CVE-2014-1832
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/56617/
Whiteboard: B4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-01-31 16:50 UTC by Agostino Sarubbo
Modified: 2015-06-17 17:53 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-01-31 16:50:55 UTC
From ${URL} :

Description

A security issue has been reported in the Phusion Passenger gem for Ruby, which can be exploited by 
malicious, local users to manipulate certain data.

The security issue is caused due to a race condition error when creating a certain temporary directory and 
can be exploited to e.g. manipulate the content of certain files via symlink attacks.

The security issue is reported in versions prior to 4.0.38.

Note: The security issue is caused due to an improper fix of CVE-2014-1831.


Solution:
Update to version 4.0.38.

Provided and/or discovered by:
Raphael Geissert via the oss-security mailing list.

Original Advisory:
Phusion Passenger:
https://github.com/phusion/passenger/commit/94428057c602da3d6d34ef75c78091066ecac5c0

Raphael Geissert:
http://www.openwall.com/lists/oss-security/2014/01/29/6


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Hans de Graaff gentoo-dev Security 2014-02-13 12:51:47 UTC
It seems that 4.0.38 is not actually released either as a gem or via github. Given the type of exploit I'd rather wait until there is a proper upstream release for this.
Comment 2 Hans de Graaff gentoo-dev Security 2014-03-22 08:21:04 UTC
passenger 4.0.40 is now in the tree with a fix for this bug.

Vulnerable version will be removed after a testing period.
Comment 3 Hans de Graaff gentoo-dev Security 2014-04-16 06:03:56 UTC
  09 Apr 2014; Hans de Graaff <graaff@gentoo.org> -passenger-4.0.37.ebuild,
  -passenger-4.0.40.ebuild:
  Remove versions with vulnerable passenger standalone version. Note that the
  apache module is not affected by this.
Comment 4 Manuel Rüger (RETIRED) gentoo-dev 2015-05-31 20:33:42 UTC
Vulnerable versions have been removed.

Security, please vote.
Comment 5 Kristian Fiskerstrand (RETIRED) gentoo-dev 2015-05-31 20:35:54 UTC
GLSA Vote: No
Comment 6 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2015-05-31 20:37:24 UTC
GLSA vote: no.

Closed as [noglsa].
Comment 7 GLSAMaker/CVETool Bot gentoo-dev 2015-06-17 17:53:48 UTC
CVE-2014-1832 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1832):
  Phusion Passenger 4.0.37 allows local users to write to certain files and
  directories via a symlink attack on (1) control_process.pid or a (2)
  generation-* file.  NOTE: this vulnerability exists because of an incomplete
  fix for CVE-2014-1831.