Ubuntu 2222-1: mod_wsgi vulnerabilities

    Date26 May 2014
    CategoryUbuntu
    28
    Posted ByLinuxSecurity Advisories
    mod_wsgi could be made to run programs as an administrator if it executes a specially crafted file.
    ==========================================================================
    Ubuntu Security Notice USN-2222-1
    May 26, 2014
    
    mod-wsgi vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 14.04 LTS
    - Ubuntu 13.10
    - Ubuntu 12.04 LTS
    
    Summary:
    
    mod_wsgi could be made to run programs as an administrator if it executes
    a specially crafted file.
    
    mod_wsgi could be made to expose sensitive information over the network.
    
    Software Description:
    - mod-wsgi: Python WSGI adapter module for Apache
    
    Details:
    
    Róbert Kisteleki discovered mod_wsgi incorrectly checked setuid return
    values. A malicious application could use this issue to cause a local
    privilege escalation when using daemon mode. (CVE-2014-0240)
    
    Buck Golemon discovered that mod_wsgi used memory that had been freed.
    A remote attacker could use this issue to read process memory via the
    Content-Type response header. This issue only affected Ubuntu 12.04 LTS.
    (CVE-2014-0242)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 14.04 LTS:
      libapache2-mod-wsgi             3.4-4ubuntu2.1.14.04.1
      libapache2-mod-wsgi-py3         3.4-4ubuntu2.1.14.04.1
    
    Ubuntu 13.10:
      libapache2-mod-wsgi             3.4-4ubuntu2.1.13.10.1
      libapache2-mod-wsgi-py3         3.4-4ubuntu2.1.13.10.1
    
    Ubuntu 12.04 LTS:
      libapache2-mod-wsgi             3.3-4ubuntu0.1
      libapache2-mod-wsgi-py3         3.3-4ubuntu0.1
    
    After a standard system update you need to restart apache2 to make
    all the necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-2222-1
      CVE-2014-0240, CVE-2014-0242
    
    Package Information:
      https://launchpad.net/ubuntu/+source/mod-wsgi/3.4-4ubuntu2.1.14.04.1
      https://launchpad.net/ubuntu/+source/mod-wsgi/3.4-4ubuntu2.1.13.10.1
      https://launchpad.net/ubuntu/+source/mod-wsgi/3.3-4ubuntu0.1
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.11,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":33.33,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.