1
PublicDateAtUSN: 2014-05-23
2
Candidate: CVE-2014-0240
5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0240
6
http://blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html
7
https://usn.ubuntu.com/usn/usn-2222-1
9
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled,
10
does not properly handle error codes returned by setuid when run on certain
11
Linux kernels, which allows local users to gain privileges via vectors
12
related to the number of running processes.
15
mdeslaur> from upstream: The issue is believed to affect Linux systems
16
mdeslaur> running kernel versions >= 2.6.0 and < 3.1.0.
18
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338
19
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=748910
21
Discovered-by: Róbert Kisteleki
25
upstream: https://github.com/GrahamDumpleton/mod_wsgi/commit/d9d5fea585b23991f76532a9b07de7fcd3b649f4
26
upstream_mod-wsgi: released (3.5-1)
27
lucid_mod-wsgi: ignored (reached end-of-life)
28
precise_mod-wsgi: released (3.3-4ubuntu0.1)
29
saucy_mod-wsgi: released (3.4-4ubuntu2.1.13.10.1)
30
trusty_mod-wsgi: released (3.4-4ubuntu2.1.14.04.1)
31
devel_mod-wsgi: released (3.5-1)