|Category:||SuSE Local Security Checks|
|Title:||SUSE: Security Advisory (SUSE-SU-2018:0262-1)|
|Summary:||The remote host is missing an update for the 'rubygem-passenger' package(s) announced via the SUSE-SU-2018:0262-1 advisory.|
The remote host is missing an update for the 'rubygem-passenger' package(s) announced via the SUSE-SU-2018:0262-1 advisory.
This update for rubygem-passenger fixes several issues.
These security issues were fixed:
- CVE-2017-16355: When Passenger was running as root it was possible to
list the contents of arbitrary files on a system by symlinking a file
named REVISION from the application root folder to a file of choice and
querying passenger-status --show=xml (bsc#1073255).
- CVE-2017-1000384: Introduces a new check that logs a vulnerability
warning if Passenger is run with root permissions while the directory
permissions of (parts of) its root dir allow modifications by non-root
'rubygem-passenger' package(s) on SUSE Linux Enterprise Module for Containers 12
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2017-1000384|
Common Vulnerability Exposure (CVE) ID: CVE-2017-16355
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.