- Issued:
- 2014-06-25
- Updated:
- 2014-06-25
RHSA-2014:0788 - Security Advisory
Synopsis
Important: mod_wsgi security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated mod_wsgi package that fixes two security issues is now available
for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Description
The mod_wsgi adapter is an Apache module that provides a WSGI-compliant
interface for hosting Python-based web applications within Apache.
It was found that mod_wsgi did not properly drop privileges if the call to
setuid() failed. If mod_wsgi was set up to allow unprivileged users to run
WSGI applications, a local user able to run a WSGI application could
possibly use this flaw to escalate their privileges on the system.
(CVE-2014-0240)
Note: mod_wsgi is not intended to provide privilege separation for WSGI
applications. Systems relying on mod_wsgi to limit or sandbox the
privileges of mod_wsgi applications should migrate to a different solution
with proper privilege separation.
It was discovered that mod_wsgi could leak memory of a hosted web
application via the "Content-Type" header. A remote attacker could possibly
use this flaw to disclose limited portions of the web application's memory.
(CVE-2014-0242)
Red Hat would like to thank Graham Dumpleton for reporting these issues.
Upstream acknowledges Róbert Kisteleki as the original reporter of
CVE-2014-0240, and Buck Golemon as the original reporter of CVE-2014-0242.
All mod_wsgi users are advised to upgrade to this updated package, which
contains backported patches to correct these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.5 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.5 i386
- Red Hat Enterprise Linux Server - AUS 6.5 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.5 s390x
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.5 ppc64
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - TUS 6.5 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.5 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.5 i386
- Red Hat Enterprise Linux EUS Compute Node 6.5 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x
Fixes
- BZ - 1101863 - CVE-2014-0240 mod_wsgi: possible privilege escalation in setuid() failure scenarios
- BZ - 1101873 - CVE-2014-0242 mod_wsgi: information leak
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
x86_64 | |
mod_wsgi-3.2-6.el6_5.x86_64.rpm | SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 |
mod_wsgi-3.2-6.el6_5.x86_64.rpm | SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 |
mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm | SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f |
mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm | SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f |
i386 | |
mod_wsgi-3.2-6.el6_5.i686.rpm | SHA-256: 0f30165c342c23cbfd955431ee9b40db51f25e948800eb3604b01bef641d638d |
mod_wsgi-debuginfo-3.2-6.el6_5.i686.rpm | SHA-256: ccfdada703583036a324a0a99676ec2c158112ad9ff243d8fbb429b29bee75bd |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.5
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
x86_64 | |
mod_wsgi-3.2-6.el6_5.x86_64.rpm | SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 |
mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm | SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f |
i386 | |
mod_wsgi-3.2-6.el6_5.i686.rpm | SHA-256: 0f30165c342c23cbfd955431ee9b40db51f25e948800eb3604b01bef641d638d |
mod_wsgi-debuginfo-3.2-6.el6_5.i686.rpm | SHA-256: ccfdada703583036a324a0a99676ec2c158112ad9ff243d8fbb429b29bee75bd |
Red Hat Enterprise Linux Server - AUS 6.5
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
x86_64 | |
mod_wsgi-3.2-6.el6_5.x86_64.rpm | SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 |
mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm | SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
x86_64 | |
mod_wsgi-3.2-6.el6_5.x86_64.rpm | SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 |
mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm | SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f |
i386 | |
mod_wsgi-3.2-6.el6_5.i686.rpm | SHA-256: 0f30165c342c23cbfd955431ee9b40db51f25e948800eb3604b01bef641d638d |
mod_wsgi-debuginfo-3.2-6.el6_5.i686.rpm | SHA-256: ccfdada703583036a324a0a99676ec2c158112ad9ff243d8fbb429b29bee75bd |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
x86_64 | |
mod_wsgi-3.2-6.el6_5.x86_64.rpm | SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 |
mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm | SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f |
i386 | |
mod_wsgi-3.2-6.el6_5.i686.rpm | SHA-256: 0f30165c342c23cbfd955431ee9b40db51f25e948800eb3604b01bef641d638d |
mod_wsgi-debuginfo-3.2-6.el6_5.i686.rpm | SHA-256: ccfdada703583036a324a0a99676ec2c158112ad9ff243d8fbb429b29bee75bd |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
x86_64 | |
mod_wsgi-3.2-6.el6_5.x86_64.rpm | SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 |
mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm | SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f |
i386 | |
mod_wsgi-3.2-6.el6_5.i686.rpm | SHA-256: 0f30165c342c23cbfd955431ee9b40db51f25e948800eb3604b01bef641d638d |
mod_wsgi-debuginfo-3.2-6.el6_5.i686.rpm | SHA-256: ccfdada703583036a324a0a99676ec2c158112ad9ff243d8fbb429b29bee75bd |
Red Hat Enterprise Linux for IBM z Systems 6
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
s390x | |
mod_wsgi-3.2-6.el6_5.s390x.rpm | SHA-256: 30f9784326f76a6fd79ce9e41d79801af2f16d7befc758071974c2acfb0ddc66 |
mod_wsgi-debuginfo-3.2-6.el6_5.s390x.rpm | SHA-256: e4579341cf872a5b0a2ff803023dbef5bd5bf56a2a2b51c8622302d2aa1b3a6f |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.5
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
s390x | |
mod_wsgi-3.2-6.el6_5.s390x.rpm | SHA-256: 30f9784326f76a6fd79ce9e41d79801af2f16d7befc758071974c2acfb0ddc66 |
mod_wsgi-debuginfo-3.2-6.el6_5.s390x.rpm | SHA-256: e4579341cf872a5b0a2ff803023dbef5bd5bf56a2a2b51c8622302d2aa1b3a6f |
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
ppc64 | |
mod_wsgi-3.2-6.el6_5.ppc64.rpm | SHA-256: 3c9c2ae7d737a1edef51f977308371a1debff421d2cde7fc91f9c2bf5e456c44 |
mod_wsgi-debuginfo-3.2-6.el6_5.ppc64.rpm | SHA-256: 20ba63130cfae25b7bf889fc1497b1d723921449df14d8df77d3cce18206b6b7 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.5
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
ppc64 | |
mod_wsgi-3.2-6.el6_5.ppc64.rpm | SHA-256: 3c9c2ae7d737a1edef51f977308371a1debff421d2cde7fc91f9c2bf5e456c44 |
mod_wsgi-debuginfo-3.2-6.el6_5.ppc64.rpm | SHA-256: 20ba63130cfae25b7bf889fc1497b1d723921449df14d8df77d3cce18206b6b7 |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
x86_64 | |
mod_wsgi-3.2-6.el6_5.x86_64.rpm | SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 |
mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm | SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
x86_64 | |
mod_wsgi-3.2-6.el6_5.x86_64.rpm | SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 |
mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm | SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f |
i386 | |
mod_wsgi-3.2-6.el6_5.i686.rpm | SHA-256: 0f30165c342c23cbfd955431ee9b40db51f25e948800eb3604b01bef641d638d |
mod_wsgi-debuginfo-3.2-6.el6_5.i686.rpm | SHA-256: ccfdada703583036a324a0a99676ec2c158112ad9ff243d8fbb429b29bee75bd |
Red Hat Enterprise Linux Server - TUS 6.5
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
x86_64 | |
mod_wsgi-3.2-6.el6_5.x86_64.rpm | SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 |
mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm | SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
s390x | |
mod_wsgi-3.2-6.el6_5.s390x.rpm | SHA-256: 30f9784326f76a6fd79ce9e41d79801af2f16d7befc758071974c2acfb0ddc66 |
mod_wsgi-debuginfo-3.2-6.el6_5.s390x.rpm | SHA-256: e4579341cf872a5b0a2ff803023dbef5bd5bf56a2a2b51c8622302d2aa1b3a6f |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.5
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
x86_64 | |
mod_wsgi-3.2-6.el6_5.x86_64.rpm | SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 |
mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm | SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f |
i386 | |
mod_wsgi-3.2-6.el6_5.i686.rpm | SHA-256: 0f30165c342c23cbfd955431ee9b40db51f25e948800eb3604b01bef641d638d |
mod_wsgi-debuginfo-3.2-6.el6_5.i686.rpm | SHA-256: ccfdada703583036a324a0a99676ec2c158112ad9ff243d8fbb429b29bee75bd |
Red Hat Enterprise Linux EUS Compute Node 6.5
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
x86_64 | |
mod_wsgi-3.2-6.el6_5.x86_64.rpm | SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 |
mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm | SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
x86_64 | |
mod_wsgi-3.2-6.el6_5.x86_64.rpm | SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 |
mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm | SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f |
i386 | |
mod_wsgi-3.2-6.el6_5.i686.rpm | SHA-256: 0f30165c342c23cbfd955431ee9b40db51f25e948800eb3604b01bef641d638d |
mod_wsgi-debuginfo-3.2-6.el6_5.i686.rpm | SHA-256: ccfdada703583036a324a0a99676ec2c158112ad9ff243d8fbb429b29bee75bd |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6
SRPM | |
---|---|
mod_wsgi-3.2-6.el6_5.src.rpm | SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62 |
s390x | |
mod_wsgi-3.2-6.el6_5.s390x.rpm | SHA-256: 30f9784326f76a6fd79ce9e41d79801af2f16d7befc758071974c2acfb0ddc66 |
mod_wsgi-debuginfo-3.2-6.el6_5.s390x.rpm | SHA-256: e4579341cf872a5b0a2ff803023dbef5bd5bf56a2a2b51c8622302d2aa1b3a6f |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.