Описание
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 3.5-1 |
esm-infra-legacy/trusty | not-affected | 3.4-4ubuntu2.1.14.04.1 |
lucid | ignored | end of life |
precise | released | 3.3-4ubuntu0.1 |
saucy | released | 3.4-4ubuntu2.1.13.10.1 |
trusty | released | 3.4-4ubuntu2.1.14.04.1 |
trusty/esm | not-affected | 3.4-4ubuntu2.1.14.04.1 |
upstream | released | 3.5-1 |
Показывать по
EPSS
6.2 Medium
CVSS2
Связанные уязвимости
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled ...
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
EPSS
6.2 Medium
CVSS2