Fedora 27 : uwsgi (2018-04b3af1edf)

High Nessus Plugin ID 111235


The remote Fedora host is missing a security update.


- Conditionally disable router-access for tcp_wrappers deprecation (Jorge Gallegos)

- Updated to 2.0.16 which includes fix for CVE-2018-6758 (Jorge Gallegos)


- Modernize and generalize building of Python subpackages :

- replace python with python2

- use appropriate macros for when refering to Python 3

- prefix Python-dependent plugins with the version of Python they are built with

- Also build Python 3 subpackages for the other Python 3 version in EPEL7


- Build Python 3 version(s) of gevent plugin on Fedora and EPEL7

- Build Python 3 version of greenlet plugin on Fedora and EPEL7

- Build Python 2 version of greenlet plugin on EPEL7

- Always build Python 3 version of tornado plugin when building with Python 3 (drop python3_tornado build conditional)


- Latest upstream (rhbz#1549354)

- Enable uwsgi-plugin-coroae on EL7

- Use systemd tmpfiles to create /run/uwsgi with group write permissions (rhbz#1427303)

- Use /var/run/uwsgi when not using systemd

- Build with versioned python command

- Remove %%config from systemd unit file

- Disable greenlet plugin on EL7

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected uwsgi package.

See Also


Plugin Details

Severity: High

ID: 111235

File Name: fedora_2018-04b3af1edf.nasl

Version: 1.4

Type: local

Agent: unix

Published: 2018/07/24

Updated: 2019/02/07

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3.0

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:uwsgi, cpe:/o:fedoraproject:fedora:27

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2018/07/20

Vulnerability Publication Date: 2018/02/06

Exploitable With

Elliot (uWSGI Path Traversal File Disclosure)

Reference Information

CVE: CVE-2018-6758, CVE-2018-7490