UBUNTU-CVE-2014-0240

Source
https://ubuntu.com/security/CVE-2014-0240
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-0240.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2014-0240
Related
Published
2014-05-23T00:00:00Z
Modified
2014-05-23T00:00:00Z
Summary
[none]
Details

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

References

Affected packages

Ubuntu:14.04:LTS / mod-wsgi

Package

Name
mod-wsgi
Purl
pkg:deb/ubuntu/mod-wsgi?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4-4ubuntu2.1.14.04.1

Affected versions

3.*

3.4-4
3.4-4build1
3.4-4ubuntu1
3.4-4ubuntu2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "3.4-4ubuntu2.1.14.04.1",
            "binary_name": "libapache2-mod-wsgi"
        },
        {
            "binary_version": "3.4-4ubuntu2.1.14.04.1",
            "binary_name": "libapache2-mod-wsgi-py3"
        }
    ]
}