~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2014-0240

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDateAtUSN: 2014-05-23
2
 
Candidate: CVE-2014-0240
3
 
PublicDate: 2014-05-27
4
 
References:
5
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0240
6
 
 http://blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html
7
 
 https://usn.ubuntu.com/usn/usn-2222-1
8
 
Description:
9
 
 The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled,
10
 
 does not properly handle error codes returned by setuid when run on certain
11
 
 Linux kernels, which allows local users to gain privileges via vectors
12
 
 related to the number of running processes.
13
 
Ubuntu-Description:
14
 
Notes:
15
 
 mdeslaur> from upstream: The issue is believed to affect Linux systems
16
 
 mdeslaur> running kernel versions >= 2.6.0 and < 3.1.0.
17
 
Bugs:
18
 
 https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338
19
 
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=748910
20
 
Priority: medium
21
 
Discovered-by: Róbert Kisteleki
22
 
Assigned-to:
23
 
 
24
 
Patches_mod-wsgi:
25
 
 upstream: https://github.com/GrahamDumpleton/mod_wsgi/commit/d9d5fea585b23991f76532a9b07de7fcd3b649f4
26
 
upstream_mod-wsgi: released (3.5-1)
27
 
lucid_mod-wsgi: ignored (reached end-of-life)
28
 
precise_mod-wsgi: released (3.3-4ubuntu0.1)
29
 
saucy_mod-wsgi: released (3.4-4ubuntu2.1.13.10.1)
30
 
trusty_mod-wsgi: released (3.4-4ubuntu2.1.14.04.1)
31
 
devel_mod-wsgi: released (3.5-1)