A race condition in the nginx module in Phusion Passenger 3.x through 5.x
before 5.3.2 allows local escalation of privileges when a non-standard
passenger_instance_registry_dir with insufficiently strict permissions is
configured. Replacing a file with a symlink after the file was created, but
before it was chowned, leads to the target of the link being chowned via
the path. Targeting sensitive files such as root's crontab file allows
privilege escalation.
Upstream:released (5.0.30-1.1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):released (5.0.30-1+deb9u1build0.18.04.1)
Ubuntu 18.10 (Cosmic Cuttlefish):released (5.0.30-1+deb9u1build0.18.10.1)
Ubuntu 19.04 (Disco Dingo):released (5.0.30-1+deb9u1build0.19.04.1)
Ubuntu 19.10 (Eoan):not-affected (5.0.30-1.1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needs-triage)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan):DNE
More Information

Updated: 2019-06-11 23:14:18 UTC (commit ae700f7f88f74f8715b9fe38c91078876ac7a169)