Login
Newsletter
Werbung

Sicherheit: Fehlerhafte Zugriffsrechte in mod_wsgi
Aktuelle Meldungen Distributionen
Name: Fehlerhafte Zugriffsrechte in mod_wsgi
ID: USN-2431-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 14.10
Datum: Mi, 3. Dezember 2014, 18:42
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8583
Applikationen: mod_wsgi

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============7351520685499531875==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="9LDIhjH2c2x6cXPv2tt5MDkNUOuvoJ6JA"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--9LDIhjH2c2x6cXPv2tt5MDkNUOuvoJ6JA
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2431-1
December 03, 2014

mod-wsgi vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

mod_wsgi could be made to run programs with incorrect privileges.

Software Description:
- mod-wsgi: Python WSGI adapter module for Apache

Details:

It was discovered that mod_wsgi incorrectly handled errors when setting up
the working directory and group access rights. A malicious application
could possibly use this issue to cause a local privilege escalation when
using daemon mode.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.10:
libapache2-mod-wsgi 3.5-1ubuntu0.1
libapache2-mod-wsgi-py3 3.5-1ubuntu0.1

Ubuntu 14.04 LTS:
libapache2-mod-wsgi 3.4-4ubuntu2.1.14.04.2
libapache2-mod-wsgi-py3 3.4-4ubuntu2.1.14.04.2

Ubuntu 12.04 LTS:
libapache2-mod-wsgi 3.3-4ubuntu0.2
libapache2-mod-wsgi-py3 3.3-4ubuntu0.2

After a standard system update you need to restart your web service to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2431-1
CVE-2014-8583

Package Information:
https://launchpad.net/ubuntu/+source/mod-wsgi/3.5-1ubuntu0.1
https://launchpad.net/ubuntu/+source/mod-wsgi/3.4-4ubuntu2.1.14.04.2
https://launchpad.net/ubuntu/+source/mod-wsgi/3.3-4ubuntu0.2



--9LDIhjH2c2x6cXPv2tt5MDkNUOuvoJ6JA
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=66MV
-----END PGP SIGNATURE-----

--9LDIhjH2c2x6cXPv2tt5MDkNUOuvoJ6JA--


--===============7351520685499531875==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============7351520685499531875==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung