1
Candidate: CVE-2018-12028
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12028
5
https://blog.phusion.nl/2018/06/12/passenger-5-3-2-various-security-fixes/
6
https://blog.phusion.nl/passenger-5-3-2
8
An Incorrect Access Control vulnerability in SpawningKit in Phusion
9
Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious
10
application, upon spawning a child process, to report an arbitrary
11
different PID back to Passenger's process manager. If the malicious
12
application then generates an error, it would cause Passenger's process
13
manager to kill said reported arbitrary PID.
23
upstream_passenger: needs-triage
24
precise/esm_passenger: DNE
26
xenial_passenger: needs-triage
27
artful_passenger: needs-triage
28
bionic_passenger: needs-triage
29
devel_passenger: needs-triage
31
Patches_ruby-passenger:
32
upstream_ruby-passenger: needs-triage
33
precise/esm_ruby-passenger: DNE
34
trusty_ruby-passenger: needs-triage
35
xenial_ruby-passenger: DNE
36
artful_ruby-passenger: DNE
37
bionic_ruby-passenger: DNE
38
devel_ruby-passenger: DNE