{
  "threat_severity" : "Moderate",
  "public_date" : "2018-05-29T00:00:00Z",
  "bugzilla" : {
    "description" : "passenger: privilege lowering in switchGroup() in agent/ExecHelper/ExecHelperMain.cpp",
    "id" : "1594361",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1594361"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.3",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
    "status" : "draft"
  },
  "cwe" : "CWE-271",
  "details" : [ "An issue was discovered in switchGroup() in agent/ExecHelper/ExecHelperMain.cpp in Phusion Passenger before 5.3.2. The set of groups (gidset) is not set correctly, leaving it up to randomness (i.e., uninitialized memory) which supplementary groups are actually being set while lowering privileges." ],
  "statement" : "This issue did not affect the versions of rubygem-passenger as shipped with Red Hat Update Infrastructure as they did not include the vulnerable code, which was introduced in a newer version of the package.",
  "package_state" : [ {
    "product_name" : "Red Hat Ceph Storage 1.3",
    "fix_state" : "Will not fix",
    "package_name" : "ruby193-rubygem-passenger",
    "cpe" : "cpe:/a:redhat:ceph_storage:1.3"
  }, {
    "product_name" : "Red Hat Ceph Storage 1.3",
    "fix_state" : "Will not fix",
    "package_name" : "rubygem-passenger",
    "cpe" : "cpe:/a:redhat:ceph_storage:1.3"
  }, {
    "product_name" : "Red Hat Satellite 6",
    "fix_state" : "Not affected",
    "package_name" : "rubygem-passenger",
    "cpe" : "cpe:/a:redhat:satellite:6"
  }, {
    "product_name" : "Red Hat Update Infrastructure 3 for Cloud Providers",
    "fix_state" : "Not affected",
    "package_name" : "rubygem-passenger",
    "cpe" : "cpe:/a:redhat:rhui:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2018-12615\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-12615" ],
  "name" : "CVE-2018-12615",
  "csaw" : false
}