<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">ruby2.7-rubygem-passenger-6.0.8-3.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11341-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">ruby2.7-rubygem-passenger-6.0.8-3.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the ruby2.7-rubygem-passenger-6.0.8-3.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11341</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2119/</URL>
      <Description>SUSE CVE CVE-2013-2119 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4547/</URL>
      <Description>SUSE CVE CVE-2013-4547 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1831/</URL>
      <Description>SUSE CVE CVE-2014-1831 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1832/</URL>
      <Description>SUSE CVE CVE-2014-1832 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7519/</URL>
      <Description>SUSE CVE CVE-2015-7519 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1247/</URL>
      <Description>SUSE CVE CVE-2016-1247 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7529/</URL>
      <Description>SUSE CVE CVE-2017-7529 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12026/</URL>
      <Description>SUSE CVE CVE-2018-12026 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12029/</URL>
      <Description>SUSE CVE CVE-2018-12029 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.7-rubygem-passenger-6.0.8-3.2">
      <FullProductName ProductID="ruby2.7-rubygem-passenger-6.0.8-3.2">ruby2.7-rubygem-passenger-6.0.8-3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby3.0-rubygem-passenger-6.0.8-3.2">
      <FullProductName ProductID="ruby3.0-rubygem-passenger-6.0.8-3.2">ruby3.0-rubygem-passenger-6.0.8-3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-passenger-6.0.8-3.2">
      <FullProductName ProductID="rubygem-passenger-6.0.8-3.2">rubygem-passenger-6.0.8-3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-passenger-apache2-6.0.8-3.2">
      <FullProductName ProductID="rubygem-passenger-apache2-6.0.8-3.2">rubygem-passenger-apache2-6.0.8-3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-passenger-nginx-6.0.8-3.2">
      <FullProductName ProductID="rubygem-passenger-nginx-6.0.8-3.2">rubygem-passenger-nginx-6.0.8-3.2</FullProductName>
    </Branch>
    <Relationship ProductReference="ruby2.7-rubygem-passenger-6.0.8-3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2">ruby2.7-rubygem-passenger-6.0.8-3.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby3.0-rubygem-passenger-6.0.8-3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2">ruby3.0-rubygem-passenger-6.0.8-3.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-passenger-6.0.8-3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2">rubygem-passenger-6.0.8-3.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-passenger-apache2-6.0.8-3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2">rubygem-passenger-apache2-6.0.8-3.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-passenger-nginx-6.0.8-3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2">rubygem-passenger-nginx-6.0.8-3.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Phusion Passenger gem before 3.0.21 and 4.0.x before 4.0.5 for Ruby allows local users to cause a denial of service (prevent application start) or gain privileges by pre-creating a temporary "config" file in a directory with a predictable name in /tmp/ before it is used by the gem.</Note>
    </Notes>
    <CVE>CVE-2013-2119</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2119.html</URL>
        <Description>CVE-2013-2119</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/828005</URL>
        <Description>SUSE Bug 828005</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919726</URL>
        <Description>SUSE Bug 919726</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.</Note>
    </Notes>
    <CVE>CVE-2013-4547</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4547.html</URL>
        <Description>CVE-2013-4547</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/851295</URL>
        <Description>SUSE Bug 851295</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Phusion Passenger before 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file.</Note>
    </Notes>
    <CVE>CVE-2014-1831</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1831.html</URL>
        <Description>CVE-2014-1831</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/860994</URL>
        <Description>SUSE Bug 860994</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864352</URL>
        <Description>SUSE Bug 864352</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.</Note>
    </Notes>
    <CVE>CVE-2014-1832</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1832.html</URL>
        <Description>CVE-2014-1832</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/860994</URL>
        <Description>SUSE Bug 860994</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864352</URL>
        <Description>SUSE Bug 864352</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X_User header.</Note>
    </Notes>
    <CVE>CVE-2015-7519</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7519.html</URL>
        <Description>CVE-2015-7519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956281</URL>
        <Description>SUSE Bug 956281</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user account to gain root privileges via a symlink attack on the error log.</Note>
    </Notes>
    <CVE>CVE-2016-1247</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1247.html</URL>
        <Description>CVE-2016-1247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007000</URL>
        <Description>SUSE Bug 1007000</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.</Note>
    </Notes>
    <CVE>CVE-2017-7529</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7529.html</URL>
        <Description>CVE-2017-7529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048265</URL>
        <Description>SUSE Bug 1048265</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace key files or directories in the spawning communication directory with symlinks. This then could result in arbitrary reads and writes, which in turn can result in information disclosure and privilege escalation.</Note>
    </Notes>
    <CVE>CVE-2018-12026</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12026.html</URL>
        <Description>CVE-2018-12026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097655</URL>
        <Description>SUSE Bug 1097655</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097663</URL>
        <Description>SUSE Bug 1097663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097664</URL>
        <Description>SUSE Bug 1097664</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, leads to the target of the link being chowned via the path. Targeting sensitive files such as root's crontab file allows privilege escalation.</Note>
    </Notes>
    <CVE>CVE-2018-12029</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12029.html</URL>
        <Description>CVE-2018-12029</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097655</URL>
        <Description>SUSE Bug 1097655</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097663</URL>
        <Description>SUSE Bug 1097663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097664</URL>
        <Description>SUSE Bug 1097664</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
