|Summary:||CVE-2014-0242 mod_wsgi: information leak|
|Product:||[Other] Security Response||Reporter:||Murray McAllister <mmcallis>|
|Component:||vulnerability||Assignee:||Red Hat Product Security <security-response-team>|
|Status:||CLOSED ERRATA||QA Contact:|
|Version:||unspecified||CC:||bkearney, bleanhar, cbillett, ccoleman, cpelland, cperry, dmcphers, extras-orphan, jdetiber, jdornak, jialiu, jkaluza, jkeck, jkurik, jmatthew, jokajak, jokerman, jorton, jrusnack, katello-bugs, kseifried, lmacken, lmeyer, mmaslano, mmccomas, mmccune, mmcgrath, mmraka, mrunge, taw, tjay, tomckay, tsanders, webstack-team, yozone|
|Fixed In Version:||mod_wsgi 3.4||Doc Type:||Bug Fix|
|Doc Text:||Story Points:||---|
|Last Closed:||2015-01-21 21:22:02 UTC||Type:||---|
|oVirt Team:||---||RHEL 7.3 requirements from Atomic Host:|
|Cloudforms Team:||---||Target Upstream Version:|
|Bug Depends On:||1101874, 1101875, 1104685, 1104686|
Description Murray McAllister 2014-05-28 05:55:03 UTC
mod_wsgi allows you to host Python applications on the Apache HTTP Server. It was found that a remote attacker could leak portions of a mod_wsgi application's memory via the Content-Type header. This issue has been fixed in mod_wsgi version 3.4. References: http://blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html https://github.com/GrahamDumpleton/mod_wsgi/commit/b0a149c1f5e569932325972e2e20176a42e43517 Acknowledgements: Red Hat would like to thank Graham Dumpleton for reporting of this issue. Upstream acknowledges Buck Golemon as the original issue reporter.
Comment 1 Murray McAllister 2014-05-28 05:58:59 UTC
Created python26-mod_wsgi tracking bugs for this issue: Affects: epel-5 [bug 1101875]
Comment 2 Murray McAllister 2014-05-28 05:59:07 UTC
Created mod_wsgi tracking bugs for this issue: Affects: epel-5 [bug 1101874]
Comment 4 Fedora Update System 2014-06-17 16:57:35 UTC
python26-mod_wsgi-3.5-1.el5, mod_wsgi-3.5-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
Comment 5 Fedora Update System 2014-06-17 23:25:59 UTC
mod_wsgi-3.5-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
Comment 6 Fedora Update System 2014-06-17 23:35:13 UTC
mod_wsgi-3.5-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
Comment 7 errata-xmlrpc 2014-06-25 15:42:28 UTC
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0788 https://rhn.redhat.com/errata/RHSA-2014-0788.html
Comment 8 Kurt Seifried 2014-08-08 19:26:04 UTC
Statement: Red Hat Update Infrastructure 2.1.3 is now in Production 2 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Update Infrastructure Life Cycle: https://access.redhat.com/support/policy/updates/rhui.