Name | CVE-2014-0240 |
Description | The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-2937-1 |
Debian Bugs | 748910 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
mod-wsgi (PTS) | jessie | 4.3.0-1 | fixed |
stretch (lts), stretch | 4.5.11-1+deb9u1 | fixed | |
buster (security), buster, buster (lts) | 4.6.5-1+deb10u1 | fixed | |
bullseye | 4.7.1-3+deb11u1 | fixed | |
bookworm | 4.9.4-1 | fixed | |
sid, trixie | 5.0.1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
mod-wsgi | source | squeeze | 3.3-2+deb6u1 | DSA-2937-1 | ||
mod-wsgi | source | wheezy | 3.3-4+deb7u1 | DSA-2937-1 | ||
mod-wsgi | source | (unstable) | 3.5-1 | 748910 |
https://github.com/GrahamDumpleton/mod_wsgi/commit/d9d5fea585b23991f76532a9b07de7fcd3b649f4
only when running with linux >= 2.6.0 and < 3.1.0