USN-5054-2: uWSGI vulnerability
3 September 2021
uWSGI could be made to crash if it received specially crafted input.
Releases
Packages
- uwsgi - fast, self-healing application container server
Details
USN-5054-1 fixed a vulnerability in uWSGI for Ubuntu 18.04 LTS. This update
provides the corresponding fixes for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
Felix Wilhelm discovered a buffer overflow flaw in the mod_proxy_uwsgi module.
An attacker could use this vulnerability to provoke an information disclosure
or potentially remote code execution.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
libapache2-mod-uwsgi
-
2.0.12-5ubuntu3.2+esm1
Available with Ubuntu Pro
-
uwsgi
-
2.0.12-5ubuntu3.2+esm1
Available with Ubuntu Pro
-
libapache2-mod-proxy-uwsgi
-
2.0.12-5ubuntu3.2+esm1
Available with Ubuntu Pro
-
libapache2-mod-ruwsgi
-
2.0.12-5ubuntu3.2+esm1
Available with Ubuntu Pro
-
uwsgi-core
-
2.0.12-5ubuntu3.2+esm1
Available with Ubuntu Pro
Ubuntu 14.04
-
libapache2-mod-uwsgi
-
1.9.17.1-5ubuntu0.1+esm1
Available with Ubuntu Pro
-
uwsgi
-
1.9.17.1-5ubuntu0.1+esm1
Available with Ubuntu Pro
-
libapache2-mod-proxy-uwsgi
-
1.9.17.1-5ubuntu0.1+esm1
Available with Ubuntu Pro
-
libapache2-mod-ruwsgi
-
1.9.17.1-5ubuntu0.1+esm1
Available with Ubuntu Pro
-
uwsgi-core
-
1.9.17.1-5ubuntu0.1+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.