[Git][security-tracker-team/security-tracker][master] 4 commits: Mark CVE-2018-12029/passenger as unimportant

Salvatore Bonaccorso carnil at debian.org
Sat Mar 16 08:43:18 GMT 2019


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
c62859c0 by Salvatore Bonaccorso at 2019-03-16T08:33:09Z
Mark CVE-2018-12029/passenger as unimportant

The nginx module is actually not build and thus the passenger binary
packages built not affected by the issue.

- - - - -
7fc724ea by Salvatore Bonaccorso at 2019-03-16T08:34:20Z
CVE-2019-12029: add upstream tag information for fixing commit

- - - - -
ad39d5ae by Salvatore Bonaccorso at 2019-03-16T08:34:39Z
Add related commits to CVE-2019-12029

Upstream included 9ed61bb4641b ("Ruby code: use {f,l}{chmod,chown} where
possible to protect against symlink attacks") in the 5.3.2 release which
can be seen as hardening which relates to the nginx module issue.

- - - - -
d5e815a3 by Salvatore Bonaccorso at 2019-03-16T08:37:33Z
Merge remote-tracking branch 'origin/master'

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -44617,10 +44617,14 @@ CVE-2018-12030 (Chevereto Free before 1.0.13 has XSS. ...)
 	NOT-FOR-US: Chevereto Free
 CVE-2018-12029 (A race condition in the nginx module in Phusion Passenger 3.x through ...)
 	{DLA-1399-1}
-	- passenger <unfixed> (bug #921767)
-	- ruby-passenger <removed>
+	- passenger <unfixed> (bug #921767; unimportant)
+	- ruby-passenger <removed> (unimportant)
 	NOTE: https://blog.phusion.nl/2018/06/12/passenger-5-3-2-various-security-fixes/
-	NOTE: https://github.com/phusion/passenger/commit/207870f5b7f5cc240587ab0977d6046782ae1d86
+	NOTE: https://github.com/phusion/passenger/commit/207870f5b7f5cc240587ab0977d6046782ae1d86 (release-5.3.2)
+	NOTE: unimportant as nginx module not built.
+	NOTE: Related hardening commits:
+	NOTE: https://github.com/phusion/passenger/commit/9ed61bb4641ba1f5158fca3840d4e4088805b5af (release-5.3.2)
+	NOTE: https://github.com/phusion/passenger/commit/4f663c8246f529e32575d50196d11cde12a6dfda (release-5.3.3)
 	NOTE: https://pulsesecurity.co.nz/advisories/phusion-passenger-priv-esc
 CVE-2018-12028 (An Incorrect Access Control vulnerability in SpawningKit in Phusion ...)
 	- passenger <not-affected> (Introduced in 5.3.0 with major refactoring of SpawningKit)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/fef205e9fb44448104ac66b45a0ce15018e91608...d5e815a3d33d95e8d705dd18d89af017014d94ac

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/fef205e9fb44448104ac66b45a0ce15018e91608...d5e815a3d33d95e8d705dd18d89af017014d94ac
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190316/3d76ca12/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list