Source: modsecurity-apache
Version: 2.9.10-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: close -1 2.9.11-1

Hi,

The following vulnerability was published for modsecurity-apache.

CVE-2025-52891[0]:
| ModSecurity is an open source, cross platform web application
| firewall (WAF) engine for Apache, IIS and Nginx. In versions 2.9.8
| to before 2.9.11, an empty XML tag can cause a segmentation fault.
| If SecParseXmlIntoArgs is set to On or OnlyArgs, and the request
| type is application/xml, and at least one XML tag is empty (eg
| <foo></foo>), then a segmentation fault occurs. This issue has been
| patched in version 2.9.11. A workaround involves setting
| SecParseXmlIntoArgs to Off.

The RC severity bug should bring the issue on the radar of the release
team. Technically I think it is not necessary RC. If you strongly
disagree do downgrade please. 

Can you approach the release team to make an unblock for the package
so we might start trixie with not this CVE open?

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-52891
    https://www.cve.org/CVERecord?id=CVE-2025-52891
[1] 
https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-gw9c-4wfm-vj3x

Regards,
Salvatore

Reply via email to