Your message dated Fri, 12 Apr 2013 18:02:04 +0000
with message-id <[email protected]>
and subject line Bug#704625: fixed in libapache-mod-security 2.5.12-1+squeeze2
has caused the Debian Bug report #704625,
regarding modsecurity-apache: CVE-2013-1915: Vulnerable to XXE attacks
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
704625: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704625
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: modsecurity-apache
Severity: grave
Tags: security upstream
Hi,
the following vulnerability was published for modsecurity-apache.
CVE-2013-1915[0]:
Vulnerable to XXE attacks
Patches where added upstream for 2.7.3[1,2] but might need some
adjustments for current versions in Debian.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1915
http://security-tracker.debian.org/tracker/CVE-2013-1915
[1] https://github.com/SpiderLabs/ModSecurity/blob/master/CHANGES
[2]
https://github.com/SpiderLabs/ModSecurity/commit/d4d80b38aa85eccb26e3c61b04d16e8ca5de76fe
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: libapache-mod-security
Source-Version: 2.5.12-1+squeeze2
We believe that the bug you reported is fixed in the latest version of
libapache-mod-security, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Alberto Gonzalez Iniesta <[email protected]> (supplier of updated
libapache-mod-security package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Mon, 02 Jul 2012 14:47:33 +0000
Source: libapache-mod-security
Binary: libapache-mod-security mod-security-common
Architecture: source all i386
Version: 2.5.12-1+squeeze2
Distribution: stable-security
Urgency: high
Maintainer: Alberto Gonzalez Iniesta <[email protected]>
Changed-By: Alberto Gonzalez Iniesta <[email protected]>
Description:
libapache-mod-security - Tighten web applications security for Apache
mod-security-common - Tighten web applications security - common files
Closes: 704625
Changes:
libapache-mod-security (2.5.12-1+squeeze2) stable-security; urgency=high
.
* CVE-2013-1915: Fix for XXE attacks.
Applied backported patch from 2.7.3. (Closes: #704625)
Adds new SecXmlExternalEntity option which by default (Off) disables
the external entity load task executed by libxml2.
Checksums-Sha1:
4472feb1aeec57eff2308b03fbee27b6f78cc124 1283
libapache-mod-security_2.5.12-1+squeeze2.dsc
768f5ff29abaeb71c43280a9808550c17e1440e7 10769
libapache-mod-security_2.5.12-1+squeeze2.debian.tar.gz
d123776838f467d2f676133d8a93e02797541da0 961526
mod-security-common_2.5.12-1+squeeze2_all.deb
e10feb33b9eb39fe98dd14c880e8512d70c17f63 114430
libapache-mod-security_2.5.12-1+squeeze2_i386.deb
Checksums-Sha256:
654ab7973fcbd79c6fc10438bbc995f06b1f66ef8bb03894339e7895a4105a0e 1283
libapache-mod-security_2.5.12-1+squeeze2.dsc
7b958e8f695e0fefe16fda2c34731aaa1c57a9a5a50dae9cafd649495cb6cdff 10769
libapache-mod-security_2.5.12-1+squeeze2.debian.tar.gz
323145d8068e972e84014052a61fee54b81089ba6c716d2542904eaa94106d6b 961526
mod-security-common_2.5.12-1+squeeze2_all.deb
bf54cd81663fb11934e0f91a4781cbf635870b70a9512f97793b5cd819de4d3b 114430
libapache-mod-security_2.5.12-1+squeeze2_i386.deb
Files:
19655d5c5c65857e2a7c271db29133a3 1283 httpd optional
libapache-mod-security_2.5.12-1+squeeze2.dsc
e90fb879eb247a782eabca20395757e8 10769 httpd optional
libapache-mod-security_2.5.12-1+squeeze2.debian.tar.gz
f2352b44ee9e3ff1a6af0b2e5b518a35 961526 httpd optional
mod-security-common_2.5.12-1+squeeze2_all.deb
461c539be94a4eb33692e7061ff98903 114430 httpd optional
libapache-mod-security_2.5.12-1+squeeze2_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iEYEARECAAYFAlFi4zgACgkQxRSvjkukAcNb0QCfe13uxOQbiHNw76trXYjfL1ZZ
fngAoKmoalP/SdXgYiq6qnG54smYW4+J
=PO0x
-----END PGP SIGNATURE-----
--- End Message ---