|  | @@ -18,10 +18,10 @@ Details
 | 
	
		
			
				|  |  |  Description
 | 
	
		
			
				|  |  |  ===========
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -The ``--uid`` and ``--gid`` arguments to the ``celeryd-multi``,
 | 
	
		
			
				|  |  | -``celeryd_detach``, ``celerybeat``, ``celeryev`` programs shipped
 | 
	
		
			
				|  |  | -with Celery versions 2.1 and later was not handled properly
 | 
	
		
			
				|  |  | -in that only the effective user was changed, and the real id remained
 | 
	
		
			
				|  |  | +The --uid and --gid arguments to the celeryd-multi,
 | 
	
		
			
				|  |  | +celeryd_detach, celerybeat and celeryev programs shipped
 | 
	
		
			
				|  |  | +with Celery versions 2.1 and later was not handled properly:
 | 
	
		
			
				|  |  | +only the effective user was changed, with the real id remaining
 | 
	
		
			
				|  |  |  unchanged.
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  In practice for affected users the vulnerability means that malicious code
 | 
	
	
		
			
				|  | @@ -35,17 +35,18 @@ malicious users cannot abuse the message broker to send messages,
 | 
	
		
			
				|  |  |  or disable the pickle serializer used in Celery so that arbitrary code
 | 
	
		
			
				|  |  |  execution is not possible.
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -Patches are now
 | 
	
		
			
				|  |  | -available to affected version series still maintained (see below).
 | 
	
		
			
				|  |  | +Patches are now available for all maintained versions (see below),
 | 
	
		
			
				|  |  | +and users are urged to upgrade, even if not directly
 | 
	
		
			
				|  |  | +affected.
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -System affected
 | 
	
		
			
				|  |  | -===============
 | 
	
		
			
				|  |  | +Systems affected
 | 
	
		
			
				|  |  | +================
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  Users of Celery versions 2.1, 2.2, 2.3, 2.4 except the recently
 | 
	
		
			
				|  |  |  released 2.2.8, 2.3.4 and 2.4.4, daemonizing the celery programs
 | 
	
		
			
				|  |  | -as the root user using either:
 | 
	
		
			
				|  |  | -    1) the --uid or --gid arguments set,
 | 
	
		
			
				|  |  | - or 2) the provided generic init scripts with the environment variables
 | 
	
		
			
				|  |  | +as the root user, using either:
 | 
	
		
			
				|  |  | +    1) the --uid or --gid arguments, or
 | 
	
		
			
				|  |  | +    2) the provided generic init scripts with the environment variables
 | 
	
		
			
				|  |  |         CELERYD_USER or CELERYD_GROUP defined,
 | 
	
		
			
				|  |  |  are affected.
 | 
	
		
			
				|  |  |  
 | 
	
	
		
			
				|  | @@ -80,3 +81,12 @@ of that series to upgrade to a more recent version.
 | 
	
		
			
				|  |  |  Distribution package maintainers are urged to provide their users
 | 
	
		
			
				|  |  |  with updated packages.
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +Please direct questions to the celery-users mailing-list:
 | 
	
		
			
				|  |  | +http://groups.google.com/group/celery-users/,
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +or if you are planning to report a security issue we request that
 | 
	
		
			
				|  |  | +you keep the information confidential by contacting
 | 
	
		
			
				|  |  | +security@celeryproject.org, so that a fix can be issued as quickly as possible.
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +Thank you!
 |