{"id":"CVE-2014-8583","details":"mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.","modified":"2026-04-16T06:15:49.943565174Z","published":"2014-12-16T18:59:08Z","related":["SUSE-RU-2015:0611-1"],"references":[{"type":"ADVISORY","url":"http://advisories.mageia.org/MGASA-2014-0513.html"},{"type":"ADVISORY","url":"http://modwsgi.readthedocs.org/en/latest/release-notes/version-4.2.4.html"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:253"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2431-1"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-49"},{"type":"FIX","url":"http://modwsgi.readthedocs.org/en/latest/release-notes/version-4.2.4.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1111034"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2014-12/msg00036.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2014/06/19/7"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2014/11/04/8"},{"type":"WEB","url":"http://www.securityfocus.com/bid/68111"}],"schema_version":"1.7.5"}