Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20171121231112.68e6c0a6@redhat.com>
Date: Tue, 21 Nov 2017 23:11:12 +0100
From: Tomas Hoger <thoger@...hat.com>
To: John Lightsey <jd@...nel.net>
Cc: oss-security@...ts.openwall.com
Subject: Re: phusion passenger CVE-2017-1000384

On Fri, 17 Nov 2017 14:58:43 -0600 John Lightsey wrote:

> > https://bugs.gentoo.org/634452
> 
> The commit for the arbitrary file read vulnerability mentioned in the
> Gentoo bug report is actually this one:
> 
> https://github.com/phusion/passenger/commit/4043718264095cde6623c2cbe8c644541036d7bf

Is passenger-status the only way to obtain the content of the target
file?  If so, this problem is mitigated in versions prior to 5.0.10
where root privileges were required to get the status information.

-- 
Tomas Hoger / Red Hat Product Security

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.