Gentoo Linux Security Advisory 201412-21 - Two vulnerabilities have been found in mod_wsgi, the worst of which could result in local privilege escalation. Versions less than 3.5 are affected.
394d64c03be297c9d4fcd2bc756057ad42ac5a830bf9618bb9c6e04176f1965d
Mandriva Linux Security Advisory 2014-137 - Multiple vulnerabilities have been discovered and corrected in apache-mod_wsgi. It was found that mod_wsgi did not properly drop privileges if the call to setuid failed. If mod_wsgi was set up to allow unprivileged users to run WSGI applications, a local user able to run a WSGI application could possibly use this flaw to escalate their privileges on the system. It was discovered that mod_wsgi could leak memory of a hosted web application via the Content-Type header. A remote attacker could possibly use this flaw to disclose limited portions of the web application's memory. The updated packages have been patched to correct these issues.
3ddfcc4920c88bed0f479472956bfb387b06ff904fa88974b7ac9b7edb4d0c30
Red Hat Security Advisory 2014-0788-01 - The mod_wsgi adapter is an Apache module that provides a WSGI-compliant interface for hosting Python-based web applications within Apache. It was found that mod_wsgi did not properly drop privileges if the call to setuid() failed. If mod_wsgi was set up to allow unprivileged users to run WSGI applications, a local user able to run a WSGI application could possibly use this flaw to escalate their privileges on the system. Note: mod_wsgi is not intended to provide privilege separation for WSGI applications. Systems relying on mod_wsgi to limit or sandbox the privileges of mod_wsgi applications should migrate to a different solution with proper privilege separation.
57c0800b7f3ba48e76c145bcd7098f16e17916222f694350196c4fe97a356438
Debian Linux Security Advisory 2937-1 - Two security issues have been found in the Python WSGI adapter module for Apache.
3fc32fb17b4ab3171b0696918d378ce832f0f9298ccdc887b01b36b1574b34eb
Ubuntu Security Notice 2222-1 - Robert Kisteleki discovered mod_wsgi incorrectly checked setuid return values. A malicious application could use this issue to cause a local privilege escalation when using daemon mode. Buck Golemon discovered that mod_wsgi used memory that had been freed. A remote attacker could use this issue to read process memory via the Content-Type response header. This issue only affected Ubuntu 12.04 LTS. Various other issues were also addressed.
36636054de74138601b060fbec176563d8ca424f38c63b93ff1a46e5c5134b57