Upstream information

CVE-2018-12029 at MITRE


A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, leads to the target of the link being chowned via the path. Targeting sensitive files such as root's crontab file allows privilege escalation.

SUSE information

Overall state of this security issue: Running

This issue is currently rated as having moderate severity.

CVSS v3 Scores
Base Score 8.1
Vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Access Vector Network
Access Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
SUSE Bugzilla entries: 1097655 [RESOLVED / UPSTREAM], 1097663 [NEW], 1097664 [RESOLVED / DUPLICATE]

No SUSE Security Announcements cross referenced.

List of packages in QA

Product(s) Package(s)
SUSE Linux Enterprise Module for Containers 12
  • ruby2.1-rubygem-passenger >= 5.0.18-12.9.1
  • ruby2.1-rubygem-passenger-debuginfo >= 5.0.18-12.9.1
  • rubygem-passenger >= 5.0.18-12.9.1
  • rubygem-passenger-apache2 >= 5.0.18-12.9.1
  • rubygem-passenger-apache2-debuginfo >= 5.0.18-12.9.1
  • rubygem-passenger-debuginfo >= 5.0.18-12.9.1
  • rubygem-passenger-debugsource >= 5.0.18-12.9.1

Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
SUSE Lifecycle Management Server 1.3 rubygem-passenger Affected
SUSE Linux Enterprise Module for Containers 12 rubygem-passenger In progress
SUSE Studio Onsite 1.3 rubygem-passenger Affected