DEBIAN-CVE-2014-0240

Source
https://security-tracker.debian.org/tracker/CVE-2014-0240
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2014-0240.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2014-0240
Upstream
Published
2014-05-27T14:55:12Z
Modified
2025-09-19T06:11:40Z
Summary
[none]
Details

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

References

Affected packages

Debian:11 / mod-wsgi

Package

Name
mod-wsgi
Purl
pkg:deb/debian/mod-wsgi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / mod-wsgi

Package

Name
mod-wsgi
Purl
pkg:deb/debian/mod-wsgi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / mod-wsgi

Package

Name
mod-wsgi
Purl
pkg:deb/debian/mod-wsgi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / mod-wsgi

Package

Name
mod-wsgi
Purl
pkg:deb/debian/mod-wsgi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}