Fedora 27 : uwsgi (2018-04b3af1edf)

critical Nessus Plugin ID 111235

Language:

Synopsis

The remote Fedora host is missing a security update.

Description

- Conditionally disable router-access for tcp_wrappers deprecation (Jorge Gallegos)

- Updated to 2.0.16 which includes fix for CVE-2018-6758 (Jorge Gallegos)

---

- Modernize and generalize building of Python subpackages :

- replace python with python2

- use appropriate macros for when refering to Python 3

- prefix Python-dependent plugins with the version of Python they are built with

- Also build Python 3 subpackages for the other Python 3 version in EPEL7

---

- Build Python 3 version(s) of gevent plugin on Fedora and EPEL7

- Build Python 3 version of greenlet plugin on Fedora and EPEL7

- Build Python 2 version of greenlet plugin on EPEL7

- Always build Python 3 version of tornado plugin when building with Python 3 (drop python3_tornado build conditional)

---

- Latest upstream (rhbz#1549354)

- Enable uwsgi-plugin-coroae on EL7

- Use systemd tmpfiles to create /run/uwsgi with group write permissions (rhbz#1427303)

- Use /var/run/uwsgi when not using systemd

- Build with versioned python command

- Remove %%config from systemd unit file

- Disable greenlet plugin on EL7

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected uwsgi package.

See Also

https://bodhi.fedoraproject.org/updates/FEDORA-2018-04b3af1edf

Plugin Details

Severity: Critical

ID: 111235

File Name: fedora_2018-04b3af1edf.nasl

Version: 1.11

Type: local

Agent: unix

Published: 7/24/2018

Updated: 9/3/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-6758

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:fedoraproject:fedora:27, p-cpe:/a:fedoraproject:fedora:uwsgi

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/20/2018

Vulnerability Publication Date: 2/6/2018

Exploitable With

Elliot (uWSGI Path Traversal File Disclosure)

Reference Information

CVE: CVE-2018-6758, CVE-2018-7490