<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2018-12028</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2018-12028</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>27</Number>
        <Date>2023-06-26T00:03:02Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-30T14:13:56Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-06-26T00:03:02Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2018-12028</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager. If the malicious application then generates an error, it would cause Passenger's process manager to kill said reported arbitrary PID.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Lifecycle Management Server 1.3">
      <Branch Type="Product Name" Name="SUSE Lifecycle Management Server 1.3">
        <FullProductName ProductID="SUSE Lifecycle Management Server 1.3" CPE="cpe:/a:suse:sle-slms:1.3">SUSE Lifecycle Management Server 1.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12" CPE="cpe:/o:suse:sle-module-containers:12">SUSE Linux Enterprise Module for Containers 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12" CPE="cpe:/o:suse:sle-module-containers:12">SUSE Linux Enterprise Module for Containers 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12" CPE="cpe:/o:suse:sle-module-containers:12">SUSE Linux Enterprise Module for Containers 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12" CPE="cpe:/o:suse:sle-module-containers:12">SUSE Linux Enterprise Module for Containers 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12" CPE="cpe:/o:suse:sle-module-containers:12">SUSE Linux Enterprise Module for Containers 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12" CPE="cpe:/o:suse:sle-module-containers:12">SUSE Linux Enterprise Module for Containers 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12" CPE="cpe:/o:suse:sle-module-containers:12">SUSE Linux Enterprise Module for Containers 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12" CPE="cpe:/o:suse:sle-module-containers:12">SUSE Linux Enterprise Module for Containers 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12" CPE="cpe:/o:suse:sle-module-containers:12">SUSE Linux Enterprise Module for Containers 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Studio Onsite 1.3">
      <Branch Type="Product Name" Name="SUSE Studio Onsite 1.3">
        <FullProductName ProductID="SUSE Studio Onsite 1.3" CPE="cpe:/o:suse:sle-studioonsite:1.3">SUSE Studio Onsite 1.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.1-rubygem-passenger">
      <FullProductName ProductID="ruby2.1-rubygem-passenger" CPE="cpe:2.3:a:ruby-lang:ruby:rubygem:*:*:*:*:*:*:*">ruby2.1-rubygem-passenger</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-passenger">
      <FullProductName ProductID="rubygem-passenger" CPE="cpe:2.3:a:phusion:passenger:*:*:*:*:*:*:*:*">rubygem-passenger</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-passenger-apache2">
      <FullProductName ProductID="rubygem-passenger-apache2">rubygem-passenger-apache2</FullProductName>
    </Branch>
    <Relationship ProductReference="rubygem-passenger" RelationType="Default Component Of" RelatesToProductReference="SUSE Lifecycle Management Server 1.3">
      <FullProductName ProductID="SUSE Lifecycle Management Server 1.3:rubygem-passenger">rubygem-passenger as a component of SUSE Lifecycle Management Server 1.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-rubygem-passenger" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12:ruby2.1-rubygem-passenger">ruby2.1-rubygem-passenger as a component of SUSE Linux Enterprise Module for Containers 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-passenger" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12:rubygem-passenger">rubygem-passenger as a component of SUSE Linux Enterprise Module for Containers 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-passenger-apache2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12:rubygem-passenger-apache2">rubygem-passenger-apache2 as a component of SUSE Linux Enterprise Module for Containers 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-passenger" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite 1.3">
      <FullProductName ProductID="SUSE Studio Onsite 1.3:rubygem-passenger">rubygem-passenger as a component of SUSE Studio Onsite 1.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager. If the malicious application then generates an error, it would cause Passenger's process manager to kill said reported arbitrary PID.</Note>
    </Notes>
    <CVE>CVE-2018-12028</CVE>
    <ProductStatuses>
      <Status Type="Known Not Affected">
        <ProductID>SUSE Lifecycle Management Server 1.3:rubygem-passenger</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 12:ruby2.1-rubygem-passenger</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 12:rubygem-passenger</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 12:rubygem-passenger-apache2</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:rubygem-passenger</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>6.8</BaseScoreV2>
        <VectorV2>AV:N/AC:M/Au:N/C:P/I:P/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>7.8</BaseScoreV3>
        <VectorV3>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
