Ubuntu Update for mod-wsgi USN-2222-1

Solution
Please Install the Updated Packages.
Insight
R&#243 bert Kisteleki discovered mod_wsgi incorrectly checked setuid return values. A malicious application could use this issue to cause a local privilege escalation when using daemon mode. (CVE-2014-0240) Buck Golemon discovered that mod_wsgi used memory that had been freed. A remote attacker could use this issue to read process memory via the Content-Type response header. This issue only affected Ubuntu 12.04 LTS. (CVE-2014-0242)
Affected
mod-wsgi on Ubuntu 14.04 LTS , Ubuntu 13.10 , Ubuntu 12.04 LTS
References