UBUNTU-CVE-2018-12028

Source
https://ubuntu.com/security/CVE-2018-12028
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-12028.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2018-12028
Related
Published
2018-06-17T20:29:00Z
Modified
2018-06-17T20:29:00Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager. If the malicious application then generates an error, it would cause Passenger's process manager to kill said reported arbitrary PID.

References

Affected packages

Ubuntu:22.04:LTS / passenger

Package

Name
passenger
Purl
pkg:deb/ubuntu/passenger?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.10-3build1

Affected versions

5.*

5.0.30-1.2

6.*

6.0.10-3

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "6.0.10-3build1",
            "binary_name": "libapache2-mod-passenger"
        },
        {
            "binary_version": "6.0.10-3build1",
            "binary_name": "libapache2-mod-passenger-dbgsym"
        },
        {
            "binary_version": "6.0.10-3build1",
            "binary_name": "passenger"
        },
        {
            "binary_version": "6.0.10-3build1",
            "binary_name": "passenger-dbgsym"
        }
    ]
}