[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3283-1] modsecurity-apache security update

Debian LTS Advisory DLA-3283-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                         Tobias Frost
January 26, 2023                              https://wiki.debian.org/LTS

Package        : modsecurity-apache
Version        : 2.9.3-1+deb10u2
CVE ID         : CVE-2022-48279 CVE-2023-24021
Debian Bug     : 1029329

Multiple issues were found in modsecurity-apache, open source, cross
platform web application firewall (WAF) engine for Apache which allows
remote attackers to bypass the applications firewall and other
unspecified impact.


    In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart
    requests were incorrectly parsed and could bypass the Web Application
    NOTE: this is related to CVE-2022-39956 but can be considered
    independent changes to the ModSecurity(C language) codebase.


    Incorrect handling of null-bytes in file uploads in ModSecurity
    before 2.9.7 may allow for Web Application Firewall bypasses and
    buffer iverflows on the Web Application Firewall when executing
    rules reading the FILES_TMP_CONTENT collection.

For Debian 10 buster, these problems have been fixed in version

We recommend that you upgrade your modsecurity-apache packages.

For the detailed security status of modsecurity-apache please refer to
its security tracker page at:

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment: signature.asc
Description: PGP signature

Reply to: