aboutsummaryrefslogtreecommitdiffstats
path: root/english/security/2020/dsa-4765.wml
diff options
context:
space:
mode:
authorLev Lamberov <dogsleg@debian.org>2020-09-19 10:38:23 +0500
committerLev Lamberov <dogsleg@debian.org>2020-09-19 10:38:23 +0500
commitb065b1cb4aeee3043ecfbff6dedae4d7f50fbcaf (patch)
tree5e2bd9b1612c374c4c676b5390a34f90a59eb050 /english/security/2020/dsa-4765.wml
parent5f3e79ef877d23efa55fa544436afab853649de5 (diff)
[SECURITY] [DSA 4765-1] modsecurity security update
Diffstat (limited to 'english/security/2020/dsa-4765.wml')
-rw-r--r--english/security/2020/dsa-4765.wml22
1 files changed, 22 insertions, 0 deletions
diff --git a/english/security/2020/dsa-4765.wml b/english/security/2020/dsa-4765.wml
new file mode 100644
index 00000000000..f1731f5b58e
--- /dev/null
+++ b/english/security/2020/dsa-4765.wml
@@ -0,0 +1,22 @@
+<define-tag description>security update</define-tag>
+<define-tag moreinfo>
+<p>Ervin Hegedues discovered that ModSecurity v3 enabled global regular
+expression matching which could result in denial of service. For
+additional information please refer to
+<a href="https://coreruleset.org/20200914/cve-2020-15598/">\
+https://coreruleset.org/20200914/cve-2020-15598/</a></p>
+
+<p>For the stable distribution (buster), this problem has been fixed in
+version 3.0.3-1+deb10u2.</p>
+
+<p>We recommend that you upgrade your modsecurity packages.</p>
+
+<p>For the detailed security status of modsecurity please refer to
+its security tracker page at:
+<a href="https://security-tracker.debian.org/tracker/modsecurity">\
+https://security-tracker.debian.org/tracker/modsecurity</a></p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/security/2020/dsa-4765.data"
+# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy