Upstream information
CVE-2014-8583 at MITRE
Description
mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
CVSS v2 Scores
| CVSS detail |  National Vulnerability Database | 
| Base Score |  6.9 | 
| Vector |  AV:L/AC:M/Au:N/C:C/I:C/A:C | 
| Access Vector |  Local | 
| Access Complexity |  Medium | 
| Authentication |  None | 
| Confidentiality Impact |  Complete | 
| Integrity Impact |  Complete | 
| Availability Impact |  Complete | 
SUSE Bugzilla entries: 
903961 [RESOLVED / FIXED], 
907649 [RESOLVED / FIXED], 
983032 [RESOLVED / FIXED]
SUSE Security Advisories:
List of released packages
| Product(s) |  Fixed package version(s) |  References | 
| SUSE Manager 1.7 |  apache2-mod_wsgi >= 3.3-5.7.1 
  |  Patchnames:  sleman17sp2-apache2-mod_wsgi | 
| SUSE Manager 2.1 |  apache2-mod_wsgi >= 3.3-5.7.17 
 auditlog-keeper >= 0.2.3+git.1417708457.eabd1a9-0.7.58 
 auditlog-keeper-rdbms >= 0.2.3+git.1417708457.eabd1a9-0.7.58 
 auditlog-keeper-spacewalk-validator >= 0.2.3+git.1417708457.eabd1a9-0.7.58 
 auditlog-keeper-syslog >= 0.2.3+git.1417708457.eabd1a9-0.7.58 
 auditlog-keeper-xmlout >= 0.2.3+git.1417708457.eabd1a9-0.7.58 
 cobbler >= 2.2.2-0.54.9 
 google-gson >= 2.2.4-0.7.52 
 libyaml-0-2 >= 0.1.3-0.10.16.11 
 oracle-config >= 1.1-0.10.10.16 
 osa-dispatcher >= 5.11.33.7-0.7.16 
 perl-Class-Singleton >= 1.4-4.13.38 
 perl-NOCpulse-Object >= 1.26.13.2-0.7.13 
 perl-Satcon >= 1.20.2-0.7.6 
 perl-auditlog-keeper-client >= 0.2.3+git.1417708457.eabd1a9-0.7.58 
 postgresql91-pltcl >= 9.1.15-0.3.1 
 pxe-default-image >= 0.1-0.20.56 
 python-enum34 >= 1.0-0.7.33 
 python-gzipstream >= 1.10.2.2-0.7.6 
 rhn-custom-info >= 5.4.22.6-0.7.13 
 rhnlib >= 2.5.69.6-0.7.6 
 rhnmd >= 5.3.18.4-0.7.15 
 rhnpush >= 5.5.71.7-0.7.16 
 sm-ncc-sync-data >= 2.1.9-0.7.6 
 smdba >= 1.5.1-0.7.6 
 spacecmd >= 2.1.25.7-0.7.9 
 spacewalk-admin >= 2.1.2.4-0.7.6 
 spacewalk-backend >= 2.1.55.15-0.7.11 
 spacewalk-backend-app >= 2.1.55.15-0.7.11 
 spacewalk-backend-applet >= 2.1.55.15-0.7.11 
 spacewalk-backend-config-files >= 2.1.55.15-0.7.11 
 spacewalk-backend-config-files-common >= 2.1.55.15-0.7.11 
 spacewalk-backend-config-files-tool >= 2.1.55.15-0.7.11 
 spacewalk-backend-iss >= 2.1.55.15-0.7.11 
 spacewalk-backend-iss-export >= 2.1.55.15-0.7.11 
 spacewalk-backend-libs >= 2.1.55.15-0.7.11 
 spacewalk-backend-package-push-server >= 2.1.55.15-0.7.11 
 spacewalk-backend-server >= 2.1.55.15-0.7.11 
 spacewalk-backend-sql >= 2.1.55.15-0.7.11 
 spacewalk-backend-sql-oracle >= 2.1.55.15-0.7.11 
 spacewalk-backend-sql-postgresql >= 2.1.55.15-0.7.11 
 spacewalk-backend-tools >= 2.1.55.15-0.7.11 
 spacewalk-backend-xml-export-libs >= 2.1.55.15-0.7.11 
 spacewalk-backend-xmlrpc >= 2.1.55.15-0.7.11 
 spacewalk-base >= 2.1.60.12-0.7.7 
 spacewalk-base-minimal >= 2.1.60.12-0.7.7 
 spacewalk-base-minimal-config >= 2.1.60.12-0.7.7 
 spacewalk-branding >= 2.1.33.10-0.7.16 
 spacewalk-certs-tools >= 2.1.6.5-0.7.10 
 spacewalk-check >= 2.1.16.6-0.7.9 
 spacewalk-client-setup >= 2.1.16.6-0.7.9 
 spacewalk-client-tools >= 2.1.16.6-0.7.9 
 spacewalk-config >= 2.1.5.4-0.7.15 
 spacewalk-doc-indexes >= 2.1.2.3-0.7.26 
 spacewalk-grail >= 2.1.60.12-0.7.7 
 spacewalk-html >= 2.1.60.12-0.7.7 
 spacewalk-java >= 2.1.165.14-0.7.16 
 spacewalk-java-config >= 2.1.165.14-0.7.16 
 spacewalk-java-lib >= 2.1.165.14-0.7.16 
 spacewalk-java-oracle >= 2.1.165.14-0.7.16 
 spacewalk-java-postgresql >= 2.1.165.14-0.7.16 
 spacewalk-pxt >= 2.1.60.12-0.7.7 
 spacewalk-reports >= 2.1.14.8-0.7.10 
 spacewalk-search >= 2.1.14.6-0.7.18 
 spacewalk-setup >= 2.1.14.9-0.7.6 
 spacewalk-setup-jabberd >= 2.1.0.2-0.7.6 
 spacewalk-sniglets >= 2.1.60.12-0.7.7 
 spacewalk-taskomatic >= 2.1.165.14-0.7.16 
 spacewalk-utils >= 2.1.27.12-0.7.25 
 spacewalksd >= 5.0.14.6-0.7.15 
 struts >= 1.2.9-162.33.22 
 supportutils-plugin-susemanager >= 1.0.3-0.5.5 
 supportutils-plugin-susemanager-client >= 1.0.4-0.5.5 
 suseRegisterInfo >= 2.1.9-0.7.29 
 susemanager >= 2.1.17-0.7.11 
 susemanager-client-config_en-pdf >= 2.1-0.15.24 
 susemanager-install_en-pdf >= 2.1-0.15.24 
 susemanager-jsp_en >= 2.1-0.15.23 
 susemanager-manuals_en >= 2.1-0.15.24 
 susemanager-proxy-quick_en-pdf >= 2.1-0.15.24 
 susemanager-reference_en-pdf >= 2.1-0.15.24 
 susemanager-schema >= 2.1.50.11-0.7.8 
 susemanager-sync-data >= 2.1.5-0.7.6 
 susemanager-tools >= 2.1.17-0.7.11 
 susemanager-user_en-pdf >= 2.1-0.15.24 
 tanukiwrapper >= 3.2.3-0.10.12 
 yum >= 3.2.29-0.19.30 
 yum-common >= 3.2.29-0.19.30 
 zypp-plugin-spacewalk >= 0.9.8-0.15.51 
  |  Patchnames:  sleman21-apache2-mod_wsgi sleman21-suse-manager-201503 | 
| SUSE Manager Proxy 1.7 |  apache2-mod_wsgi >= 3.3-5.7.1 
  |  Patchnames:  slemap17sp2-apache2-mod_wsgi | 
| SUSE Manager Proxy 2.1 |  apache2-mod_wsgi >= 3.3-5.7.1 
  |  Patchnames:  slemap21-apache2-mod_wsgi | 
| SUSE OpenStack Cloud 3.0 |  apache2-mod_wsgi >= 3.3-5.7.1 
  |  Patchnames:  sleclo30sp3-apache2-mod_wsgi | 
| SUSE OpenStack Cloud 4 |  apache2-mod_wsgi >= 3.3-5.7.1 
  |  Patchnames:  sleclo40sp3-apache2-mod_wsgi | 
SUSE Timeline for this CVE
CVE page created: Tue Nov  4 13:37:39 2014
CVE page last modified: Mon Oct  6 18:21:35 2025