[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

libapache-mod-security update in Squeeze



Hi once more, hopefully the last time in a while.

An update for libapache-mod-security in Squeeze is also needed to fix
CVE-2013-2765.
Also attached the corresponding debdiff.

Thanks,

Alberto

-- 
Alberto Gonzalez Iniesta    | Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred    | http://inittab.com

Key fingerprint = 5347 CBD8 3E30 A9EB 4D7D  4BF2 009B 3375 6B9A AA55
diff -Nru libapache-mod-security-2.5.12/debian/changelog libapache-mod-security-2.5.12/debian/changelog
--- libapache-mod-security-2.5.12/debian/changelog	2012-07-02 14:47:51.000000000 +0000
+++ libapache-mod-security-2.5.12/debian/changelog	2013-06-04 10:15:00.000000000 +0000
@@ -1,3 +1,10 @@
+libapache-mod-security (2.5.12-1+squeeze2) squeeze; urgency=low
+
+  * Applied upstream patch to fix NULL pointer dereference.
+    CVE-2013-2765. (Closes: #710217)
+
+ -- Alberto Gonzalez Iniesta <agi@inittab.org>  Tue, 04 Jun 2013 10:14:45 +0000
+
 libapache-mod-security (2.5.12-1+squeeze1) stable-security; urgency=high
 
   * CVE-2012-2751: Fix multi-part bypass due to wrong quoting.
diff -Nru libapache-mod-security-2.5.12/debian/patches/CVE-2013-2765.patch libapache-mod-security-2.5.12/debian/patches/CVE-2013-2765.patch
--- libapache-mod-security-2.5.12/debian/patches/CVE-2013-2765.patch	1970-01-01 00:00:00.000000000 +0000
+++ libapache-mod-security-2.5.12/debian/patches/CVE-2013-2765.patch	2013-06-04 10:16:27.000000000 +0000
@@ -0,0 +1,12 @@
+Index: libapache-mod-security-2.5.12/apache2/msc_reqbody.c
+===================================================================
+--- libapache-mod-security-2.5.12.orig/apache2/msc_reqbody.c	2013-06-04 10:16:16.319901192 +0000
++++ libapache-mod-security-2.5.12/apache2/msc_reqbody.c	2013-06-04 10:16:22.995934300 +0000
+@@ -139,6 +139,7 @@
+ 
+     /* Would storing this chunk mean going over the limit? */
+     if ((msr->msc_reqbody_spilltodisk)
++        && (msr->txcfg->reqbody_buffering != REQUEST_BODY_FORCEBUF_ON)
+         && (msr->msc_reqbody_length + length > (apr_size_t)msr->txcfg->reqbody_inmemory_limit))
+     {
+         msc_data_chunk **chunks;
diff -Nru libapache-mod-security-2.5.12/debian/patches/series libapache-mod-security-2.5.12/debian/patches/series
--- libapache-mod-security-2.5.12/debian/patches/series	2012-07-02 14:44:34.000000000 +0000
+++ libapache-mod-security-2.5.12/debian/patches/series	2013-06-04 10:15:47.000000000 +0000
@@ -1 +1,2 @@
 CVE-2012-2751.patch
+CVE-2013-2765.patch

Reply to: