Summary: | <www-apache/mod_wsgi-3.5: two vulnerabilities (CVE-2014-{0240,0242}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | djc |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2014/05/21/1 | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() 3.5 is in the tree. Arches, please stabilize. Arches, please test and mark stable: =www-apache/mod_wsgi-3.5 Target Keywords : "amd64 ppc x86" Thank you! amd64 stable ppc stable x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Cleanup done. Arches and Maintainer(s), Thank you for your work. New GLSA Request filed. CVE-2014-0240 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0240): The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes. This issue was resolved and addressed in GLSA 201412-21 at http://security.gentoo.org/glsa/glsa-201412-21.xml by GLSA coordinator Sean Amoss (ackle). |