DEBIAN-CVE-2018-12029

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2018-12029
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2018-12029.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2018-12029
Upstream
Published
2018-06-17T20:29:00Z
Modified
2025-09-19T06:15:20Z
Summary
[none]
Details

A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passengerinstanceregistry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, leads to the target of the link being chowned via the path. Targeting sensitive files such as root's crontab file allows privilege escalation.

References

Affected packages

Debian:11 / passenger

Package

Name
passenger
Purl
pkg:deb/debian/passenger?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0.30-1.1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / passenger

Package

Name
passenger
Purl
pkg:deb/debian/passenger?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0.30-1.1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / passenger

Package

Name
passenger
Purl
pkg:deb/debian/passenger?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0.30-1.1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:14 / passenger

Package

Name
passenger
Purl
pkg:deb/debian/passenger?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0.30-1.1

Ecosystem specific

{
    "urgency": "unimportant"
}