mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.
Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1111034 | |
http://www.securityfocus.com/bid/68111 | vdb entry |
http://advisories.mageia.org/MGASA-2014-0513.html | |
http://modwsgi.readthedocs.org/en/latest/release-notes/version-4.2.4.html | patch vendor advisory |
http://www.openwall.com/lists/oss-security/2014/06/19/7 | mailing list |
https://security.gentoo.org/glsa/201612-49 | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2014-12/msg00036.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2014/11/04/8 | mailing list |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:253 | vendor advisory |
http://www.ubuntu.com/usn/USN-2431-1 | vendor advisory |