Security Advisory Moderate: rubygem-passenger security update

Advisory: RHSA-2013:1136-1
Type: Security Advisory
Severity: Moderate
Issued on: 2013-08-05
Last updated on: 2013-08-05
Affected Products: Red Hat OpenShift Enterprise 1
CVEs ( CVE-2013-2119


Updated rubygem-passenger packages that fix two security issues are now
available for Red Hat OpenShift Enterprise 1.2.2.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

rubygem-passenger is a web server for Ruby, Python and Node.js

The rubygem-passenger gem created and re-used temporary directories and
files in an insecure fashion. A local attacker could use these flaws to
conduct a denial of service attack, take over the operation of the
application or, potentially, execute arbitrary code with the privileges of
the user running rubygem-passenger. (CVE-2013-2119, CVE-2013-4136)

Note: By default, OpenShift Enterprise uses polyinstantiation (per user)
for the /tmp/ directory, thereby minimizing the risk and impact of
exploitation by local attackers of both CVE-2013-2119 and CVE-2013-4136.

The CVE-2013-2119 issue was discovered by Michael Scherer of the Red Hat
Regional IT team.

The following packages are included with this update as dependencies of the
updated Ruby 1.8 passenger packages:


Users of Red Hat OpenShift Enterprise 1.2.2 are advised to upgrade to
these updated packages, which correct these issues. After installing the
updated packages, manual action is required before the update takes effect.
Refer to the Solution section for details.


Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at

Manual action is required for this update to take effect. In order for the
updated passenger packages to be loaded by Ruby applications in the PaaS,
the applications must be restarted with oo-admin-ctl-gears. One way to
accomplish this is by running the following command, as a single line
without the line break, on all OpenShift Nodes:

for rubyapp in `ls -d /var/lib/openshift/*/ruby |
cut -f5 -d/`; do oo-admin-ctl-gears restartgear $rubyapp; done

If there are no Ruby applications on a Node it will simply fail with the
message "No such file or directory". Another option is to run the
following on all OpenShift Nodes; however, it will result in non-Ruby
applications also being restarted:

oo-admin-ctl-gears restartall

(Note that without the manual action, if a user attempts to restart their
Ruby application via the rhc command line, it will fail to start with a
"Passenger could not be initialized..." error.)

Updated packages

Red Hat OpenShift Enterprise 1

ruby193-rubygem-passenger-3.0.21-3.el6op.src.rpm     MD5: 0c19a1ddb6b6aebc8c7098ba2ed7f83d
SHA-256: 5f77062d508d1537b11c81444db7d87579786db29a65c17a8a6dc2eeb69773d9
rubygem-file-tail-1.0.5-4.el6op.src.rpm     MD5: b680219075f6b32ef953c210bc10ccc1
SHA-256: 632ae21d015f2d994670b23225d9cf1c30538d3a3b6b94635b9c797470cd3047
rubygem-passenger-3.0.21-3.el6op.src.rpm     MD5: e1b6ba803384a2ed0610f209cfe9ee61
SHA-256: 3b1e01c3e1f6e1385a8ab4e1a5fb7d04e1140b1d315da2cea5c112c0b655da52
rubygem-spruz-0.2.5-4.el6op.src.rpm     MD5: 0f72b0d8ed0f1c4f190e1fc31c6e7162
SHA-256: d84c6fc7b0871a050e9a636102c42a5341e24391205d752d67b0b1e6b82dcad0
mod_passenger-3.0.21-3.el6op.x86_64.rpm     MD5: 9cd26bcba8c719c9649a0dd466f6670c
SHA-256: c5a1817be4d1538e864936ed1c4f5f47dfa35d522433b2944d9cf31710bcb730
ruby193-mod_passenger-3.0.21-3.el6op.x86_64.rpm     MD5: c0f67a7e88ad3f2b9ad4fdd7cb32c8ec
SHA-256: 6f30b5d4dc32929c52575b2d17d113309be197fcfadf32e269fc66508e633d77
ruby193-rubygem-passenger-3.0.21-3.el6op.x86_64.rpm     MD5: 79edc60a800cf104b8aa07e10aade976
SHA-256: 27e8e8ac99b97f948d3b35cf8de65c022b3f2491f9751b4f8f4c8e4e698e4229
ruby193-rubygem-passenger-devel-3.0.21-3.el6op.x86_64.rpm     MD5: bd620c466b29624e3ec90eaa53e6738a
SHA-256: 85c3b93046a1404fbd05e94af861abdce355ae26bc9e292fe73489804cdaeef2
ruby193-rubygem-passenger-doc-3.0.21-3.el6op.x86_64.rpm     MD5: 3588374d3e0e1cc58ebf3d0ee1268706
SHA-256: 3e04a9c5500022caa346bfceb23977ef9089574e064491e73e4aec1a8851e787
ruby193-rubygem-passenger-native-3.0.21-3.el6op.x86_64.rpm     MD5: d606205190bbe6b2624763085d214231
SHA-256: 28d26e045dfeb552ee6fc135d59d05f4dced8728032a6ad5484d80cd4c65786f
ruby193-rubygem-passenger-native-libs-3.0.21-3.el6op.x86_64.rpm     MD5: ad91218048b4a61f53e1e6dfde45adbc
SHA-256: f0a726e81cc566d938859b1a0260d7d18eed7fdd2e77b08bb990da16925c1550
rubygem-file-tail-1.0.5-4.el6op.noarch.rpm     MD5: 1dff70188b58cd60d60dde486d1f9c1a
SHA-256: d50d81668014a0ca7aeb57dc2234e6204bd4bf1e1c7e3d043a2fb3b300aff385
rubygem-file-tail-doc-1.0.5-4.el6op.noarch.rpm     MD5: 85a1da4beb0821e699f820befbef2f0d
SHA-256: 777d8429fe23992a3c6c3b850881377eff01db4d0f72f3483609f183d53eb365
rubygem-passenger-3.0.21-3.el6op.x86_64.rpm     MD5: ee3fc1618d314f507a7051eb508b650b
SHA-256: 3dd69f32a43987dce100eef39aa77e32a455dcf25fef2ce7e94a8dc589ef4f64
rubygem-passenger-devel-3.0.21-3.el6op.x86_64.rpm     MD5: 4beed66efa93a551d34c64b3a166ab9a
SHA-256: a109531bc5a226ee2e47bdd9fcb0c7d06990a48b3190919c7cee42034b3f1382
rubygem-passenger-doc-3.0.21-3.el6op.x86_64.rpm     MD5: f63519565cc7ce6c9cfa63414da3ace6
SHA-256: 6470790e836edff9c74765de0d3f2807111367318626a2c93a13b602480eebee
rubygem-passenger-native-3.0.21-3.el6op.x86_64.rpm     MD5: 10ed3a5473159be525a8897906762b21
SHA-256: c3cc468f7647abd964ba6273523eb076f5ba5a65992e30d9fee632cf68c49d36
rubygem-passenger-native-libs-3.0.21-3.el6op.x86_64.rpm     MD5: 7c1a14c78347e5d199ed449d22ea0320
SHA-256: d496fda6d35c1705c090f4aeff44aa2cb6c6a78fcf31aa893937601ce65ef0e4
rubygem-spruz-0.2.5-4.el6op.noarch.rpm     MD5: 842bfdab36ce5a0fb0afd6706e3c60cf
SHA-256: 79f4190e9feb95cec073a8664e8c2527223c0d433dc0abee82cb6ffbfa43bf56
rubygem-spruz-doc-0.2.5-4.el6op.noarch.rpm     MD5: 76a8b63ce7514363b681b7f6d900ed3c
SHA-256: 1303bd04dcdd6bea0025acc1d6dfbc229195a9989a9956cfad4631676811db2e
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

892813 - CVE-2013-2119 rubygem-passenger: incorrect temporary file usage
985633 - CVE-2013-4136 rubygem-passenger: insecure temporary directory usage due to reuse of existing server instance directories


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is More contact details at