Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200409-08 ] Ruby: CGI::Session creates files insecurely
Date: Fri, 03 Sep 2004 19:22:09
Message-Id: 200409032117.13894.jaervosz@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200409-08
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: Normal
11 Title: Ruby: CGI::Session creates files insecurely
12 Date: September 03, 2004
13 Bugs: #60525
14 ID: 200409-08
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 When used for CGI scripting, Ruby creates session files in /tmp with
22 the permissions of the default umask. Depending on that umask, local
23 users may be able to read sensitive data stored in session files.
24
25 Background
26 ==========
27
28 Ruby is an Object Oriented, interpreted scripting language used for
29 many system scripting tasks. It can also be used for CGI web
30 applications.
31
32 Affected packages
33 =================
34
35 -------------------------------------------------------------------
36 Package / Vulnerable / Unaffected
37 -------------------------------------------------------------------
38 1 dev-lang/ruby < 1.8.2_pre2 *>= 1.6.8-r11
39 *>= 1.8.0-r7
40 >= 1.8.2_pre2
41
42 Description
43 ===========
44
45 The CGI::Session::FileStore implementation (and presumably
46 CGI::Session::PStore), which allow data associated with a particular
47 Session instance to be written to a file, writes to a file in /tmp with
48 no regard for secure permissions. As a result, the file is left with
49 whatever the default umask permissions are, which commonly would allow
50 other local users to read the data from that session file.
51
52 Impact
53 ======
54
55 Depending on the default umask, any data stored using these methods
56 could be read by other users on the system.
57
58 Workaround
59 ==========
60
61 By changing the default umask on the system to not permit read access
62 to other users (e.g. 0700), one can prevent these files from being
63 readable by other users.
64
65 Resolution
66 ==========
67
68 All Ruby users should upgrade to the latest version:
69
70 # emerge sync
71
72 # emerge -pv ">=dev-lang/ruby-your_version"
73 # emerge ">=dev-lang/ruby-your_version"
74
75 References
76 ==========
77
78 [ 1 ] CAN-2004-0755
79 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0755
80
81 Availability
82 ============
83
84 This GLSA and any updates to it are available for viewing at
85 the Gentoo Security Website:
86
87 http://security.gentoo.org/glsa/glsa-200409-08.xml
88
89 Concerns?
90 =========
91
92 Security is a primary focus of Gentoo Linux and ensuring the
93 confidentiality and security of our users machines is of utmost
94 importance to us. Any security concerns should be addressed to
95 security@g.o or alternatively, you may file a bug at
96 http://bugs.gentoo.org.
97
98 License
99 =======
100
101 Copyright 2004 Gentoo Foundation, Inc; referenced text
102 belongs to its owner(s).
103
104 The contents of this document are licensed under the
105 Creative Commons - Attribution / Share Alike license.
106
107 http://creativecommons.org/licenses/by-sa/1.0
108 -----BEGIN PGP SIGNATURE-----
109 Version: GnuPG v1.2.4 (GNU/Linux)
110
111 iD8DBQFBOMMqzKC5hMHO6rkRAqmnAJ9LMGqjEBpUTQAXLNIFIDEH6TTR+ACfUCAh
112 LjX87bbkNFchTqau42NZ4wo=
113 =xWAL
114 -----END PGP SIGNATURE-----