The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://secunia.com/advisories/59551 | third party advisory |
http://www.securityfocus.com/bid/67532 | vdb entry |
http://modwsgi.readthedocs.org/en/latest/release-notes/version-3.5.html | |
http://www.openwall.com/lists/oss-security/2014/05/21/1 | mailing list |
http://rhn.redhat.com/errata/RHSA-2014-0789.html | vendor advisory |
http://blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html | |
http://secunia.com/advisories/60094 | third party advisory |