Bug 1101863 (CVE-2014-0240)
Summary: | CVE-2014-0240 mod_wsgi: possible privilege escalation in setuid() failure scenarios | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Murray McAllister <mmcallis> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aaron.knister, bkearney, bleanhar, cbillett, ccoleman, cpelland, cperry, dmcphers, extras-orphan, jdetiber, jdornak, jialiu, jkaluza, jkeck, jkurik, jmatthew, jokajak, jokerman, jorton, jrusnack, katello-bugs, kseifried, lmacken, lmeyer, mmaslano, mmccomas, mmccune, mmcgrath, mmraka, mrunge, taw, tjay, tomckay, tsanders, webstack-team |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | mod_wsgi 3.5 | Doc Type: | Bug Fix |
Doc Text: |
It was found that mod_wsgi did not properly drop privileges if the call to setuid() failed. If mod_wsgi was set up to allow unprivileged users to run WSGI applications, a local user able to run a WSGI application could possibly use this flaw to escalate their privileges on the system.
Note: mod_wsgi is not intended to provide privilege separation for WSGI applications. Systems relying on mod_wsgi to limit or sandbox the privileges of mod_wsgi applications should migrate to a different solution with proper privilege separation.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2015-01-21 21:42:49 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1101869, 1101870, 1101871, 1104687, 1104688, 1104698, 1104699, 1104700, 1104701, 1131467, 1131471, 1160124 | ||
Bug Blocks: | 1101877 |
Description
Murray McAllister
2014-05-28 05:44:53 UTC
Created python26-mod_wsgi tracking bugs for this issue: Affects: epel-5 [bug 1101871] Created mod_wsgi tracking bugs for this issue: Affects: fedora-all [bug 1101869] Affects: epel-5 [bug 1101870] 3.5 building for rawhide now http://pkgs.fedoraproject.org/cgit/mod_wsgi.git/log/ http://koji.fedoraproject.org/koji/taskinfo?taskID=6907211 Are there any plans to fix this for EL6? I didn't see any bugs open for it. Is this perhaps what BZ#1101877 is? We'll need tracking bugs for OpenShift as well python27-mod_wsgi for openshift-enterprise-2, openshift-enterprise-2.1, openshift-online python33-mod_wsgi for openshift-enterprise-2.1, openshift-online python26-mod_wsgi-3.5-1.el5, mod_wsgi-3.5-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report. mod_wsgi-3.5-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. mod_wsgi-3.5-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in following products: Red Hat Software Collections 1 for Red Hat Enterprise Linux 6 Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.3 EUS Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.4 EUS Red Hat Software Collections 1 for Red Hat Enterprise Linux 7 Via RHSA-2014:0789 https://rhn.redhat.com/errata/RHSA-2014-0789.html This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0788 https://rhn.redhat.com/errata/RHSA-2014-0788.html Red Hat Update Infrastructure 2.1.3 is now in Production 2 Phase of the support and maintenance life cycle. This has been rated as having Important security impact, however as used in RHUI this issue is not exposed to untrusted users, as such it is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Update Infrastructure Life Cycle: https://access.redhat.com/support/policy/updates/rhui. IssueDescription: It was found that mod_wsgi did not properly drop privileges if the call to setuid() failed. If mod_wsgi was set up to allow unprivileged users to run WSGI applications, a local user able to run a WSGI application could possibly use this flaw to escalate their privileges on the system. Note: mod_wsgi is not intended to provide privilege separation for WSGI applications. Systems relying on mod_wsgi to limit or sandbox the privileges of mod_wsgi applications should migrate to a different solution with proper privilege separation. This issue has been addressed in following products: Red Hat Enterprise Linux 7 Via RHSA-2014:1091 https://rhn.redhat.com/errata/RHSA-2014-1091.html |