SUSE Security Update: Security update for rubygem-passenger
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:2039-1
Rating:             moderate
References:         #1097663 
Cross-References:   CVE-2018-12029
Affected Products:
                    SUSE Linux Enterprise Module for Containers 12
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for rubygem-passenger fixes the following issue:

   The following security vulnerability was addressed:

   - CVE-2018-12029: Fixed a file system access race condition in the chown
     command, which allowed for local privilege escalation and affects the
     Nginx module (bsc#1097663).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Containers 12:

      zypper in -t patch SUSE-SLE-Module-Containers-12-2018-1373=1



Package List:

   - SUSE Linux Enterprise Module for Containers 12 (x86_64):

      ruby2.1-rubygem-passenger-5.0.18-12.9.1
      ruby2.1-rubygem-passenger-debuginfo-5.0.18-12.9.1
      rubygem-passenger-5.0.18-12.9.1
      rubygem-passenger-apache2-5.0.18-12.9.1
      rubygem-passenger-apache2-debuginfo-5.0.18-12.9.1
      rubygem-passenger-debuginfo-5.0.18-12.9.1
      rubygem-passenger-debugsource-5.0.18-12.9.1


References:

   https://www.suse.com/security/cve/CVE-2018-12029.html
   https://bugzilla.suse.com/1097663

SUSE: 2018:2039-1 moderate: rubygem-passenger

July 23, 2018
An update that fixes one vulnerability is now available

Summary

This update for rubygem-passenger fixes the following issue: The following security vulnerability was addressed: - CVE-2018-12029: Fixed a file system access race condition in the chown command, which allowed for local privilege escalation and affects the Nginx module (bsc#1097663). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Containers 12: zypper in -t patch SUSE-SLE-Module-Containers-12-2018-1373=1 Package List: - SUSE Linux Enterprise Module for Containers 12 (x86_64): ruby2.1-rubygem-passenger-5.0.18-12.9.1 ruby2.1-rubygem-passenger-debuginfo-5.0.18-12.9.1 rubygem-passenger-5.0.18-12.9.1 rubygem-passenger-apache2-5.0.18-12.9.1 rubygem-passenger-apache2-debuginfo-5.0.18-12.9.1 rubygem-passenger-debuginfo-5.0.18-12.9.1 rubygem-passenger-debugsource-5.0.18-12.9.1

References

#1097663

Cross- CVE-2018-12029

Affected Products:

SUSE Linux Enterprise Module for Containers 12

https://www.suse.com/security/cve/CVE-2018-12029.html

https://bugzilla.suse.com/1097663

Severity
Announcement ID: SUSE-SU-2018:2039-1
Rating: moderate