USN-2222-1: mod_wsgi vulnerabilities

26 May 2014

mod_wsgi could be made to run programs as an administrator if it executes a specially crafted file. mod_wsgi could be made to expose sensitive information over the network.

Releases

Packages

  • mod-wsgi - Python WSGI adapter module for Apache

Details

RĂ³bert Kisteleki discovered mod_wsgi incorrectly checked setuid return
values. A malicious application could use this issue to cause a local
privilege escalation when using daemon mode. (CVE-2014-0240)

Buck Golemon discovered that mod_wsgi used memory that had been freed.
A remote attacker could use this issue to read process memory via the
Content-Type response header. This issue only affected Ubuntu 12.04 LTS.
(CVE-2014-0242)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04
Ubuntu 13.10
Ubuntu 12.04

After a standard system update you need to restart apache2 to make
all the necessary changes.