Описание
mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.
mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-8583
- https://bugzilla.redhat.com/show_bug.cgi?id=1111034
- https://security.gentoo.org/glsa/201612-49
- http://advisories.mageia.org/MGASA-2014-0513.html
- http://lists.opensuse.org/opensuse-updates/2014-12/msg00036.html
- http://modwsgi.readthedocs.org/en/latest/release-notes/version-4.2.4.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:253
- http://www.openwall.com/lists/oss-security/2014/06/19/7
- http://www.openwall.com/lists/oss-security/2014/11/04/8
- http://www.securityfocus.com/bid/68111
- http://www.ubuntu.com/usn/USN-2431-1
EPSS
CVE ID
Связанные уязвимости
mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.
mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.
mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.
mod_wsgi before 4.2.4 for Apache, when creating a daemon process group ...
EPSS