USN-2222-1: mod_wsgi vulnerabilities
Ubuntu Security Notice USN-2222-1
26th May, 2014
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
- Ubuntu 12.04 LTS
mod_wsgi could be made to run programs as an administrator if it executes a specially crafted file. mod_wsgi could be made to expose sensitive information over the network.
- mod-wsgi - Python WSGI adapter module for Apache
Róbert Kisteleki discovered mod_wsgi incorrectly checked setuid return
values. A malicious application could use this issue to cause a local
privilege escalation when using daemon mode. (CVE-2014-0240)
Buck Golemon discovered that mod_wsgi used memory that had been freed.
A remote attacker could use this issue to read process memory via the
Content-Type response header. This issue only affected Ubuntu 12.04 LTS.
The problem can be corrected by updating your system to the following package version:
- Ubuntu 14.04 LTS:
- libapache2-mod-wsgi 3.4-4ubuntu2.1.14.04.1
- libapache2-mod-wsgi-py3 3.4-4ubuntu2.1.14.04.1
- Ubuntu 13.10:
- libapache2-mod-wsgi 3.4-4ubuntu220.127.116.11.1
- libapache2-mod-wsgi-py3 3.4-4ubuntu18.104.22.168.1
- Ubuntu 12.04 LTS:
- libapache2-mod-wsgi 3.3-4ubuntu0.1
- libapache2-mod-wsgi-py3 3.3-4ubuntu0.1
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart apache2 to make
all the necessary changes.