Hi, I just uploaded modsecurity-crs 2.2.8 which contains a fix in that
rule, although reported upstream for a different reason. Could you check
if this bug is still present with that version?

Thanks,

Alberto

On Fri, Apr 12, 2013 at 01:59:55AM +0200, Richard van den Berg wrote:
> Package: modsecurity-crs
> Version: 2.2.5-2
> Severity: normal
> 
> All requests are blocked with:
> 
> --e89aa861-H--
> Message: Rule 7f2a17e96280 [id "950901"][file 
> "/usr/share/modsecurity-crs/activated_rules/modsecurity_crs_41_sql_injection_attacks.conf"][line
>  "77"] - Execution error - PCRE limits exceeded (-8): (null).
> Message: Rule 7f2a17e96280 [id "950901"][file 
> "/usr/share/modsecurity-crs/activated_rules/modsecurity_crs_41_sql_injection_attacks.conf"][line
>  "77"] - Execution error - PCRE limits exceeded (-8): (null).
> Message: Rule 7f2a17e96280 [id "950901"][file 
> "/usr/share/modsecurity-crs/activated_rules/modsecurity_crs_41_sql_injection_attacks.conf"][line
>  "77"] - Execution error - PCRE limits exceeded (-8): (null).
> Message: Rule 7f2a17e96280 [id "950901"][file 
> "/usr/share/modsecurity-crs/activated_rules/modsecurity_crs_41_sql_injection_attacks.conf"][line
>  "77"] - Execution error - PCRE limits exceeded (-8): (null).
> Message: Access denied with code 403 (phase 2). Match of "streq 0" against 
> "TX:MSC_PCRE_LIMITS_EXCEEDED" required. [file 
> "/etc/modsecurity/modsecurity.conf"] [line "95"] [msg "ModSecurity internal 
> error flagged: TX:MSC_PCRE_LIMITS_EXCEEDED"]
> Action: Intercepted (phase 2)
> Stopwatch: 1365724321610331 46739 (- - -)
> Stopwatch2: 1365724321610331 46739; combined=43414, p1=532, p2=41873, p3=0, 
> p4=0, p5=1004, sr=191, sw=5, l=0, gc=0
> Response-Body-Transformed: Dechunked
> Producer: ModSecurity for Apache/2.6.6 (http://www.modsecurity.org/); 
> OWASP_CRS/2.2.5.
> Server: Apache
> 
> --e89aa861-Z--
> 
> Increasing SecPcreMatchLimit, SecPcreMatchLimitRecursion, 
> pcre.backtrack_limit and pcre.recursion_limit does not help.
> 
> --e89aa861-Z--
> 
> -- System Information:
> Debian Release: 7.0
>   APT prefers stable
>   APT policy: (990, 'stable'), (400, 'testing'), (300, 'unstable')
> Architecture: amd64 (x86_64)
> 
> Kernel: Linux 3.4.0-Soleus (SMP w/2 CPU cores)
> Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
> Shell: /bin/sh linked to /bin/dash
> 
> Versions of packages modsecurity-crs depends on:
> ii  libapache2-modsecurity  2.6.6-6
> 
> modsecurity-crs recommends no packages.
> 
> Versions of packages modsecurity-crs suggests:
> pn  lua  <none>
> 
> -- no debconf information

-- 
Alberto Gonzalez Iniesta    | Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred    | http://inittab.com

Key fingerprint = 5347 CBD8 3E30 A9EB 4D7D  4BF2 009B 3375 6B9A AA55


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to