Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1111034 - (CVE-2014-8583) CVE-2014-8583 mod_wsgi: failure to handle errors when attempting to drop group privileges
CVE-2014-8583 mod_wsgi: failure to handle errors when attempting to drop grou...
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20140617,repor...
: Security
Depends On: 1111035 1111036 1111037
Blocks: 1111043
  Show dependency treegraph
 
Reported: 2014-06-19 02:11 EDT by Murray McAllister
Modified: 2015-07-31 03:22 EDT (History)
35 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-02-19 16:04:56 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
mod_wsgi-4.2.3 Vs mod_wsgi-4.2.4 diff (9.18 KB, patch)
2014-06-19 02:17 EDT, Murray McAllister
no flags Details | Diff

  None (edit)
Description Murray McAllister 2014-06-19 02:11:02 EDT
mod_wsgi allows you to host Python applications on the Apache HTTP Server. It was reported that mod_wsgi failed to handle errors when attempting to drop group privileges. An error would be printed, but mod_wsgi would continue running with root group privileges.

If an administrator has configured mod_wsgi to allow less trusted users to run a WSGI application, they could use this flaw to escalate their privileges if a group-dropping function failed.

This issue has been fixed in the 4.2.4 release:

http://modwsgi.readthedocs.org/en/latest/release-notes/version-4.2.4.html

References:

http://seclists.org/oss-sec/2014/q2/545
http://seclists.org/oss-sec/2014/q2/555
Comment 1 Murray McAllister 2014-06-19 02:14:04 EDT
Created python26-mod_wsgi tracking bugs for this issue:

Affects: epel-5 [bug 1111037]
Comment 2 Murray McAllister 2014-06-19 02:14:11 EDT
Created mod_wsgi tracking bugs for this issue:

Affects: fedora-all [bug 1111035]
Affects: epel-5 [bug 1111036]
Comment 3 Murray McAllister 2014-06-19 02:17:27 EDT
Created attachment 910266 [details]
mod_wsgi-4.2.3 Vs mod_wsgi-4.2.4 diff

A diff of upstream versions mod_wsgi-4.2.3 and mod_wsgi-4.2.4.zip. Note all the extra return() calls.
Comment 6 Murray McAllister 2014-06-19 02:25:58 EDT
CVE request: http://www.openwall.com/lists/oss-security/2014/06/19/7
Comment 7 Kurt Seifried 2014-08-08 15:25:45 EDT
Red Hat Update Infrastructure 2.1.3 is now in Production 2 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Update Infrastructure Life Cycle: https://access.redhat.com/support/policy/updates/rhui.
Comment 8 Vasyl Kaigorodov 2014-11-04 07:05:38 EST
CVE-2014-8583 was assigned to this issue: http://seclists.org/oss-sec/2014/q4/519
Comment 10 Kurt Seifried 2015-02-19 16:04:56 EST
Statement:

This issue affects the versions of mod_wsgi as shipped with Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Note You need to log in before you can comment on or make changes to this bug.