diff options
author | Lev Lamberov <dogsleg@debian.org> | 2020-09-19 10:38:23 +0500 |
---|---|---|
committer | Lev Lamberov <dogsleg@debian.org> | 2020-09-19 10:38:23 +0500 |
commit | b065b1cb4aeee3043ecfbff6dedae4d7f50fbcaf (patch) | |
tree | 5e2bd9b1612c374c4c676b5390a34f90a59eb050 /english/security/2020/dsa-4765.wml | |
parent | 5f3e79ef877d23efa55fa544436afab853649de5 (diff) |
[SECURITY] [DSA 4765-1] modsecurity security update
Diffstat (limited to 'english/security/2020/dsa-4765.wml')
-rw-r--r-- | english/security/2020/dsa-4765.wml | 22 |
1 files changed, 22 insertions, 0 deletions
diff --git a/english/security/2020/dsa-4765.wml b/english/security/2020/dsa-4765.wml new file mode 100644 index 00000000000..f1731f5b58e --- /dev/null +++ b/english/security/2020/dsa-4765.wml @@ -0,0 +1,22 @@ +<define-tag description>security update</define-tag> +<define-tag moreinfo> +<p>Ervin Hegedues discovered that ModSecurity v3 enabled global regular +expression matching which could result in denial of service. For +additional information please refer to +<a href="https://coreruleset.org/20200914/cve-2020-15598/">\ +https://coreruleset.org/20200914/cve-2020-15598/</a></p> + +<p>For the stable distribution (buster), this problem has been fixed in +version 3.0.3-1+deb10u2.</p> + +<p>We recommend that you upgrade your modsecurity packages.</p> + +<p>For the detailed security status of modsecurity please refer to +its security tracker page at: +<a href="https://security-tracker.debian.org/tracker/modsecurity">\ +https://security-tracker.debian.org/tracker/modsecurity</a></p> +</define-tag> + +# do not modify the following line +#include "$(ENGLISHDIR)/security/2020/dsa-4765.data" +# $Id: $ |