Debian alert DLA-4488-1 (modsecurity-crs)
| From: | Tobias Frost <tobi@debian.org> | |
| To: | debian-lts-announce@lists.debian.org | |
| Subject: | [SECURITY] [DLA 4488-1] modsecurity-crs security update | |
| Date: | Sun, 22 Feb 2026 11:03:27 +0100 | |
| Message-ID: | <aZrUb9ihJx3_uoF2@isildor2.loewenhoehle.ip> |
------------------------------------------------------------------------- Debian LTS Advisory DLA-4488-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Tobias Frost February 22, 2026 https://wiki.debian.org/LTS ------------------------------------------------------------------------- Package : modsecurity-crs Version : 3.3.4-1~deb11u2 CVE ID : CVE-2023-38199 CVE-2026-21876 Debian Bug : 1041109 1125084 Multiple issues have been fixed in modsecurity-crs, a set of generic attack detection rules for use with ModSecurity. CVE-2023-38199 Coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not detect multiple Content-Type request headers on some platforms. This might allow attackers to bypass a WAF with a crafted payload, aka "Content-Type confusion" between the WAF and the backend application. This occurs when the web application relies on only the last Content-Type header. Other platforms may reject the additional Content-Type header or merge conflicting headers, leading to detection as a malformed header. CVE-2026-21876 The current rule 922110 has a bug when processing multipart requests with multiple parts. When the first rule in a chain iterates over a collection (like `MULTIPART_PART_HEADERS`), the capture variables (`TX:0`, `TX:1`) get overwritten with each iteration. Only the last captured value is available to the chained rule, which means malicious charsets in earlier parts can be missed if a later part has a legitimate charset. For Debian 11 bullseye, these problems have been fixed in version 3.3.4-1~deb11u2. We recommend that you upgrade your modsecurity-crs packages. For the detailed security status of modsecurity-crs please refer to its security tracker page at: https://security-tracker.debian.org/tracker/modsecurity-crs Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
Attachment: signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEE/d0M/zhkJ3YwohhskWT6HRe9XTYFAmma1GwACgkQkWT6HRe9 XTYCAQ//QCy3bpNe4ENbZUhbLkv3tYv2b9VEc7RjzcOm7Br+EIL0Fn0PFbdWBGQO 1ugVTvDQgWMzBRIeUN4KVAswZcsfU54N5sRv0OFpbF+WBRJZNxMXVuiZisz5BjJ8 FFiG9K3P6AadcgV/zgZz20E9M18slVkaMxVFT7CY1jKuUhkZ2d2RBgekM697PHye l625HXOtmMR0RRr4ZAaDbPvI5wjtIRIdELOMK8V8xoLosOEtuomQCfWlr2EL8/c6 3Yr28f9u+vOjzuAgAsq6CNVtYnk7ocITKrKizXHahTgJInAbW4uDo+HvTGOzGvuc nelAQRFLAp6aSRKZI/QVNvP7WArS5l8ZOpvisNLRdW4xiKadBS7WJv2vOrCIDdFl nl2J2PVn4nbjsAnIeZUZMpuj/Qp04Qha1Vmfi7V4Z32x5On7p6Hk6w8DVV63pcmR k5dKVE+rFYFzOIwDkbtbYVA8Pk7HUFOXRoo1soQtSrSuWH/aDLMlX4D5FavEI5iN roD6mGhHcbeIkvEx9LUCIS5oxl3LaGSeixTAgVg0chi1SaDa7N2do8w/hLUB3dWD /khyH2ikoARUyb/r9zOz/sMSRs65mYuy5U1CXsNrV9WarQypK2HhZ8jHPbwZRGq4 2j4fROIa1iRX8fWMqhy9df4rsO37sO1aq07GDRR7/c4UN2zGYAU= =1hK+ -----END PGP SIGNATURE-----
