The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-2937-1 | mod-wsgi security update |
![]() |
EUVD-2014-0278 | The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes. |
![]() |
USN-2222-1 | mod_wsgi vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T09:05:39.376Z
Reserved: 2013-12-03T00:00:00
Link: CVE-2014-0240

No data.

Status : Deferred
Published: 2014-05-27T14:55:12.197
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-0240


No data.