LWN.net Logo

Mageia alert MGASA-2013-0179 (apache-mod_security)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0179: apache-mod_security new security issue CVE-2013-2765
Date:  Wed, 26 Jun 2013 20:00:30 +0200
Message-ID:  <20130626180030.95C5D4205E@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0179 - apache-mod_security new security issue CVE-2013-2765 Publication date: 26 Jun 2013 URL: http://advisories.mageia.org/MGASA-2013-0179.html Type: security Affected Mageia releases: 2, 3 CVE: CVE-2013-2765 Description: Updated apache-mod_security packages fix security vulnerability: When ModSecurity receives a request body with a size bigger than the value set by the "SecRequestBodyInMemoryLimit" and with a "Content-Type" that has no request body processor mapped to it, ModSecurity will systematically crash on every call to "forceRequestBodyVariable" (in phase 1) (CVE-2013-2765). References: - http://www.shookalabs.com/#advisory-cve-2013-2765 - https://lists.fedoraproject.org/pipermail/package-announc... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2765 SRPMS: - 3/core/apache-mod_security-2.7.4-1.mga3 - 2/core/apache-mod_security-2.6.3-3.5.mga2


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds