Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:1136 - Security Advisory
Issued:
2013-08-05
Updated:
2013-08-05

RHSA-2013:1136 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: rubygem-passenger security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated rubygem-passenger packages that fix two security issues are now
available for Red Hat OpenShift Enterprise 1.2.2.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

rubygem-passenger is a web server for Ruby, Python and Node.js
applications.

The rubygem-passenger gem created and re-used temporary directories and
files in an insecure fashion. A local attacker could use these flaws to
conduct a denial of service attack, take over the operation of the
application or, potentially, execute arbitrary code with the privileges of
the user running rubygem-passenger. (CVE-2013-2119, CVE-2013-4136)

Note: By default, OpenShift Enterprise uses polyinstantiation (per user)
for the /tmp/ directory, thereby minimizing the risk and impact of
exploitation by local attackers of both CVE-2013-2119 and CVE-2013-4136.

The CVE-2013-2119 issue was discovered by Michael Scherer of the Red Hat
Regional IT team.

The following packages are included with this update as dependencies of the
updated Ruby 1.8 passenger packages:

rubygem-spruz-0.2.5-4.el6op
rubygem-file-tail-1.0.5-4.el6op

Users of Red Hat OpenShift Enterprise 1.2.2 are advised to upgrade to
these updated packages, which correct these issues. After installing the
updated packages, manual action is required before the update takes effect.
Refer to the Solution section for details.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Manual action is required for this update to take effect. In order for the
updated passenger packages to be loaded by Ruby applications in the PaaS,
the applications must be restarted with oo-admin-ctl-gears. One way to
accomplish this is by running the following command, as a single line
without the line break, on all OpenShift Nodes:

for rubyapp in `ls -d /var/lib/openshift/*/ruby |
cut -f5 -d/`; do oo-admin-ctl-gears restartgear $rubyapp; done

If there are no Ruby applications on a Node it will simply fail with the
message "No such file or directory". Another option is to run the
following on all OpenShift Nodes; however, it will result in non-Ruby
applications also being restarted:

oo-admin-ctl-gears restartall

(Note that without the manual action, if a user attempts to restart their
Ruby application via the rhc command line, it will fail to start with a
"Passenger could not be initialized..." error.)

Affected Products

  • Red Hat OpenShift Enterprise Infrastructure 1.2 x86_64
  • Red Hat OpenShift Enterprise Application Node 1.2 x86_64

Fixes

  • BZ - 892813 - CVE-2013-2119 rubygem-passenger: incorrect temporary file usage
  • BZ - 985633 - CVE-2013-4136 rubygem-passenger: insecure temporary directory usage due to reuse of existing server instance directories

CVEs

  • CVE-2013-2119
  • CVE-2013-4136

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenShift Enterprise Infrastructure 1.2

SRPM
ruby193-rubygem-passenger-3.0.21-3.el6op.src.rpm SHA-256: 5f77062d508d1537b11c81444db7d87579786db29a65c17a8a6dc2eeb69773d9
rubygem-file-tail-1.0.5-4.el6op.src.rpm SHA-256: 632ae21d015f2d994670b23225d9cf1c30538d3a3b6b94635b9c797470cd3047
rubygem-passenger-3.0.21-3.el6op.src.rpm SHA-256: 3b1e01c3e1f6e1385a8ab4e1a5fb7d04e1140b1d315da2cea5c112c0b655da52
rubygem-spruz-0.2.5-4.el6op.src.rpm SHA-256: d84c6fc7b0871a050e9a636102c42a5341e24391205d752d67b0b1e6b82dcad0
x86_64
mod_passenger-3.0.21-3.el6op.x86_64.rpm SHA-256: c5a1817be4d1538e864936ed1c4f5f47dfa35d522433b2944d9cf31710bcb730
ruby193-mod_passenger-3.0.21-3.el6op.x86_64.rpm SHA-256: 6f30b5d4dc32929c52575b2d17d113309be197fcfadf32e269fc66508e633d77
ruby193-rubygem-passenger-3.0.21-3.el6op.x86_64.rpm SHA-256: 27e8e8ac99b97f948d3b35cf8de65c022b3f2491f9751b4f8f4c8e4e698e4229
ruby193-rubygem-passenger-debuginfo-3.0.21-3.el6op.x86_64.rpm SHA-256: 79b03f6db4325d8cbe800ee55d7b3f11046a7314cbc693f8ec24161388b6cb88
ruby193-rubygem-passenger-devel-3.0.21-3.el6op.x86_64.rpm SHA-256: 85c3b93046a1404fbd05e94af861abdce355ae26bc9e292fe73489804cdaeef2
ruby193-rubygem-passenger-doc-3.0.21-3.el6op.x86_64.rpm SHA-256: 3e04a9c5500022caa346bfceb23977ef9089574e064491e73e4aec1a8851e787
ruby193-rubygem-passenger-native-3.0.21-3.el6op.x86_64.rpm SHA-256: 28d26e045dfeb552ee6fc135d59d05f4dced8728032a6ad5484d80cd4c65786f
ruby193-rubygem-passenger-native-libs-3.0.21-3.el6op.x86_64.rpm SHA-256: f0a726e81cc566d938859b1a0260d7d18eed7fdd2e77b08bb990da16925c1550
rubygem-file-tail-1.0.5-4.el6op.noarch.rpm SHA-256: d50d81668014a0ca7aeb57dc2234e6204bd4bf1e1c7e3d043a2fb3b300aff385
rubygem-file-tail-doc-1.0.5-4.el6op.noarch.rpm SHA-256: 777d8429fe23992a3c6c3b850881377eff01db4d0f72f3483609f183d53eb365
rubygem-passenger-3.0.21-3.el6op.x86_64.rpm SHA-256: 3dd69f32a43987dce100eef39aa77e32a455dcf25fef2ce7e94a8dc589ef4f64
rubygem-passenger-debuginfo-3.0.21-3.el6op.x86_64.rpm SHA-256: d792b21f3a4b3fd9874f4c92415a1d892e78898af9459f1ead1fc290d40474aa
rubygem-passenger-devel-3.0.21-3.el6op.x86_64.rpm SHA-256: a109531bc5a226ee2e47bdd9fcb0c7d06990a48b3190919c7cee42034b3f1382
rubygem-passenger-doc-3.0.21-3.el6op.x86_64.rpm SHA-256: 6470790e836edff9c74765de0d3f2807111367318626a2c93a13b602480eebee
rubygem-passenger-native-3.0.21-3.el6op.x86_64.rpm SHA-256: c3cc468f7647abd964ba6273523eb076f5ba5a65992e30d9fee632cf68c49d36
rubygem-passenger-native-libs-3.0.21-3.el6op.x86_64.rpm SHA-256: d496fda6d35c1705c090f4aeff44aa2cb6c6a78fcf31aa893937601ce65ef0e4
rubygem-spruz-0.2.5-4.el6op.noarch.rpm SHA-256: 79f4190e9feb95cec073a8664e8c2527223c0d433dc0abee82cb6ffbfa43bf56
rubygem-spruz-doc-0.2.5-4.el6op.noarch.rpm SHA-256: 1303bd04dcdd6bea0025acc1d6dfbc229195a9989a9956cfad4631676811db2e

Red Hat OpenShift Enterprise Application Node 1.2

SRPM
ruby193-rubygem-passenger-3.0.21-3.el6op.src.rpm SHA-256: 5f77062d508d1537b11c81444db7d87579786db29a65c17a8a6dc2eeb69773d9
rubygem-file-tail-1.0.5-4.el6op.src.rpm SHA-256: 632ae21d015f2d994670b23225d9cf1c30538d3a3b6b94635b9c797470cd3047
rubygem-passenger-3.0.21-3.el6op.src.rpm SHA-256: 3b1e01c3e1f6e1385a8ab4e1a5fb7d04e1140b1d315da2cea5c112c0b655da52
rubygem-spruz-0.2.5-4.el6op.src.rpm SHA-256: d84c6fc7b0871a050e9a636102c42a5341e24391205d752d67b0b1e6b82dcad0
x86_64
mod_passenger-3.0.21-3.el6op.x86_64.rpm SHA-256: c5a1817be4d1538e864936ed1c4f5f47dfa35d522433b2944d9cf31710bcb730
ruby193-mod_passenger-3.0.21-3.el6op.x86_64.rpm SHA-256: 6f30b5d4dc32929c52575b2d17d113309be197fcfadf32e269fc66508e633d77
ruby193-rubygem-passenger-3.0.21-3.el6op.x86_64.rpm SHA-256: 27e8e8ac99b97f948d3b35cf8de65c022b3f2491f9751b4f8f4c8e4e698e4229
ruby193-rubygem-passenger-debuginfo-3.0.21-3.el6op.x86_64.rpm SHA-256: 79b03f6db4325d8cbe800ee55d7b3f11046a7314cbc693f8ec24161388b6cb88
ruby193-rubygem-passenger-devel-3.0.21-3.el6op.x86_64.rpm SHA-256: 85c3b93046a1404fbd05e94af861abdce355ae26bc9e292fe73489804cdaeef2
ruby193-rubygem-passenger-doc-3.0.21-3.el6op.x86_64.rpm SHA-256: 3e04a9c5500022caa346bfceb23977ef9089574e064491e73e4aec1a8851e787
ruby193-rubygem-passenger-native-3.0.21-3.el6op.x86_64.rpm SHA-256: 28d26e045dfeb552ee6fc135d59d05f4dced8728032a6ad5484d80cd4c65786f
ruby193-rubygem-passenger-native-libs-3.0.21-3.el6op.x86_64.rpm SHA-256: f0a726e81cc566d938859b1a0260d7d18eed7fdd2e77b08bb990da16925c1550
rubygem-file-tail-1.0.5-4.el6op.noarch.rpm SHA-256: d50d81668014a0ca7aeb57dc2234e6204bd4bf1e1c7e3d043a2fb3b300aff385
rubygem-file-tail-doc-1.0.5-4.el6op.noarch.rpm SHA-256: 777d8429fe23992a3c6c3b850881377eff01db4d0f72f3483609f183d53eb365
rubygem-passenger-3.0.21-3.el6op.x86_64.rpm SHA-256: 3dd69f32a43987dce100eef39aa77e32a455dcf25fef2ce7e94a8dc589ef4f64
rubygem-passenger-debuginfo-3.0.21-3.el6op.x86_64.rpm SHA-256: d792b21f3a4b3fd9874f4c92415a1d892e78898af9459f1ead1fc290d40474aa
rubygem-passenger-devel-3.0.21-3.el6op.x86_64.rpm SHA-256: a109531bc5a226ee2e47bdd9fcb0c7d06990a48b3190919c7cee42034b3f1382
rubygem-passenger-doc-3.0.21-3.el6op.x86_64.rpm SHA-256: 6470790e836edff9c74765de0d3f2807111367318626a2c93a13b602480eebee
rubygem-passenger-native-3.0.21-3.el6op.x86_64.rpm SHA-256: c3cc468f7647abd964ba6273523eb076f5ba5a65992e30d9fee632cf68c49d36
rubygem-passenger-native-libs-3.0.21-3.el6op.x86_64.rpm SHA-256: d496fda6d35c1705c090f4aeff44aa2cb6c6a78fcf31aa893937601ce65ef0e4
rubygem-spruz-0.2.5-4.el6op.noarch.rpm SHA-256: 79f4190e9feb95cec073a8664e8c2527223c0d433dc0abee82cb6ffbfa43bf56
rubygem-spruz-doc-0.2.5-4.el6op.noarch.rpm SHA-256: 1303bd04dcdd6bea0025acc1d6dfbc229195a9989a9956cfad4631676811db2e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility