mod_wsgi allows you to host Python applications on the Apache HTTP Server. It was reported that mod_wsgi could fail to drop root privileges: if the setuid() call failed, an error was logged and mod_wsgi continued running with elevated privileges, rather than exiting. If an administrator has configured mod_wsgi to allow less trusted users to run a WSGI application, they could use this flaw to escalate their privileges if they are able to cause the setuid() call to fail. Note that it is not clear whether mod_wsgi was designed to be safe against local attackers, and this may be a similar situation to PHP's safe mode, https://bugzilla.redhat.com/show_bug.cgi?id=169857#c1 This issue has been fixed in mod_wsgi version 3.5. References: http://blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html https://github.com/GrahamDumpleton/mod_wsgi/commit/d9d5fea585b23991f76532a9b07de7fcd3b649f4 Acknowledgements: Red Hat would like to thank Graham Dumpleton for reporting of this issue. Upstream acknowledges Róbert Kisteleki as the original reporter.
Created python26-mod_wsgi tracking bugs for this issue: Affects: epel-5 [bug 1101871]
Created mod_wsgi tracking bugs for this issue: Affects: fedora-all [bug 1101869] Affects: epel-5 [bug 1101870]
3.5 building for rawhide now http://pkgs.fedoraproject.org/cgit/mod_wsgi.git/log/ http://koji.fedoraproject.org/koji/taskinfo?taskID=6907211
Are there any plans to fix this for EL6? I didn't see any bugs open for it. Is this perhaps what BZ#1101877 is?
We'll need tracking bugs for OpenShift as well python27-mod_wsgi for openshift-enterprise-2, openshift-enterprise-2.1, openshift-online python33-mod_wsgi for openshift-enterprise-2.1, openshift-online
python26-mod_wsgi-3.5-1.el5, mod_wsgi-3.5-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
mod_wsgi-3.5-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
mod_wsgi-3.5-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Software Collections 1 for Red Hat Enterprise Linux 6 Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.3 EUS Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.4 EUS Red Hat Software Collections 1 for Red Hat Enterprise Linux 7 Via RHSA-2014:0789 https://rhn.redhat.com/errata/RHSA-2014-0789.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0788 https://rhn.redhat.com/errata/RHSA-2014-0788.html
Red Hat Update Infrastructure 2.1.3 is now in Production 2 Phase of the support and maintenance life cycle. This has been rated as having Important security impact, however as used in RHUI this issue is not exposed to untrusted users, as such it is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Update Infrastructure Life Cycle: https://access.redhat.com/support/policy/updates/rhui.
IssueDescription: It was found that mod_wsgi did not properly drop privileges if the call to setuid() failed. If mod_wsgi was set up to allow unprivileged users to run WSGI applications, a local user able to run a WSGI application could possibly use this flaw to escalate their privileges on the system. Note: mod_wsgi is not intended to provide privilege separation for WSGI applications. Systems relying on mod_wsgi to limit or sandbox the privileges of mod_wsgi applications should migrate to a different solution with proper privilege separation.
This issue has been addressed in following products: Red Hat Enterprise Linux 7 Via RHSA-2014:1091 https://rhn.redhat.com/errata/RHSA-2014-1091.html