<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for rubygem-passenger</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:2039-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-07-23T08:43:57Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-07-23T08:43:57Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-07-23T08:43:57Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for rubygem-passenger</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for rubygem-passenger fixes the following issue:

The following security vulnerability was addressed:

- CVE-2018-12029: Fixed a file system access race condition in the chown
  command, which allowed for local privilege escalation and affects the Nginx
  module (bsc#1097663).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Module-Containers-12-2018-1373</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182039-1/</URL>
      <Description>Link for SUSE-SU-2018:2039-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-July/004296.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:2039-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1097663</URL>
      <Description>SUSE Bug 1097663</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12029/</URL>
      <Description>SUSE CVE CVE-2018-12029 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Containers 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12" CPE="cpe:/o:suse:sle-module-containers:12">SUSE Linux Enterprise Module for Containers 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.1-rubygem-passenger-5.0.18-12.9.1">
      <FullProductName ProductID="ruby2.1-rubygem-passenger-5.0.18-12.9.1">ruby2.1-rubygem-passenger-5.0.18-12.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-passenger-5.0.18-12.9.1">
      <FullProductName ProductID="rubygem-passenger-5.0.18-12.9.1">rubygem-passenger-5.0.18-12.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-passenger-apache2-5.0.18-12.9.1">
      <FullProductName ProductID="rubygem-passenger-apache2-5.0.18-12.9.1">rubygem-passenger-apache2-5.0.18-12.9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ruby2.1-rubygem-passenger-5.0.18-12.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12:ruby2.1-rubygem-passenger-5.0.18-12.9.1">ruby2.1-rubygem-passenger-5.0.18-12.9.1 as a component of SUSE Linux Enterprise Module for Containers 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-passenger-5.0.18-12.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12:rubygem-passenger-5.0.18-12.9.1">rubygem-passenger-5.0.18-12.9.1 as a component of SUSE Linux Enterprise Module for Containers 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-passenger-apache2-5.0.18-12.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12:rubygem-passenger-apache2-5.0.18-12.9.1">rubygem-passenger-apache2-5.0.18-12.9.1 as a component of SUSE Linux Enterprise Module for Containers 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, leads to the target of the link being chowned via the path. Targeting sensitive files such as root's crontab file allows privilege escalation.</Note>
    </Notes>
    <CVE>CVE-2018-12029</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Containers 12:ruby2.1-rubygem-passenger-5.0.18-12.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 12:rubygem-passenger-5.0.18-12.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 12:rubygem-passenger-apache2-5.0.18-12.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182039-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12029.html</URL>
        <Description>CVE-2018-12029</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097655</URL>
        <Description>SUSE Bug 1097655</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097663</URL>
        <Description>SUSE Bug 1097663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097664</URL>
        <Description>SUSE Bug 1097664</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
