It was discovered that Phusion Passenger incorrectly handled a file path in
the application root folder. An attacker could possibly use this issue to
read arbitrary files. (CVE-2017-16355)
It was discovered that Phusion Passenger had a race condition in the nginx
module that could be used to perform a symlink attack. An attacker could
possibly use this issue to escalate privileges. (CVE-2018-12029)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.04 | noarch | passenger | <Â 5.0.27-2ubuntu0.1~esm1 | UNKNOWN |
Ubuntu | 16.04 | noarch | libapache2-mod-passenger | <Â 5.0.27-2 | UNKNOWN |
Ubuntu | 16.04 | noarch | libapache2-mod-passenger-dbgsym | <Â 5.0.27-2 | UNKNOWN |
Ubuntu | 16.04 | noarch | passenger | <Â 5.0.27-2 | UNKNOWN |
Ubuntu | 16.04 | noarch | passenger-dbgsym | <Â 5.0.27-2 | UNKNOWN |
Ubuntu | 16.04 | noarch | passenger-doc | <Â 5.0.27-2 | UNKNOWN |
Ubuntu | 16.04 | noarch | ruby-passenger | <Â 5.0.27-2 | UNKNOWN |
Ubuntu | 16.04 | noarch | ruby-passenger-doc | <Â 5.0.27-2 | UNKNOWN |
Ubuntu | 16.04 | noarch | libapache2-mod-passenger | <Â 5.0.27-2ubuntu0.1~esm1 | UNKNOWN |