| From: |
| Mageia Updates <buildsystem-daemon@mageia.org> |
| To: |
| updates-announce@ml.mageia.org |
| Subject: |
| [updates-announce] MGASA-2013-0179: apache-mod_security new
security issue CVE-2013-2765 |
| Date: |
| Wed, 26 Jun 2013 20:00:30 +0200 |
| Message-ID: |
| <20130626180030.95C5D4205E@valstar.mageia.org> |
| Archive-link: |
| Article, Thread
|
MGASA-2013-0179 - apache-mod_security new security issue CVE-2013-2765
Publication date: 26 Jun 2013
URL: http://advisories.mageia.org/MGASA-2013-0179.html
Type: security
Affected Mageia releases: 2, 3
CVE: CVE-2013-2765
Description:
Updated apache-mod_security packages fix security vulnerability:
When ModSecurity receives a request body with a size bigger than the
value set by the "SecRequestBodyInMemoryLimit" and with a
"Content-Type" that has no request body processor mapped to it,
ModSecurity will systematically crash on every call to
"forceRequestBodyVariable" (in phase 1) (CVE-2013-2765).
References:
- http://www.shookalabs.com/#advisory-cve-2013-2765
- https://lists.fedoraproject.org/pipermail/package-announc...
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2765
SRPMS:
- 3/core/apache-mod_security-2.7.4-1.mga3
- 2/core/apache-mod_security-2.6.3-3.5.mga2
(
Log in to post comments)