Source: modsecurity-apache Version: 2.9.10-1 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Control: close -1 2.9.11-1
Hi, The following vulnerability was published for modsecurity-apache. CVE-2025-52891[0]: | ModSecurity is an open source, cross platform web application | firewall (WAF) engine for Apache, IIS and Nginx. In versions 2.9.8 | to before 2.9.11, an empty XML tag can cause a segmentation fault. | If SecParseXmlIntoArgs is set to On or OnlyArgs, and the request | type is application/xml, and at least one XML tag is empty (eg | <foo></foo>), then a segmentation fault occurs. This issue has been | patched in version 2.9.11. A workaround involves setting | SecParseXmlIntoArgs to Off. The RC severity bug should bring the issue on the radar of the release team. Technically I think it is not necessary RC. If you strongly disagree do downgrade please. Can you approach the release team to make an unblock for the package so we might start trixie with not this CVE open? For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-52891 https://www.cve.org/CVERecord?id=CVE-2025-52891 [1] https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-gw9c-4wfm-vj3x Regards, Salvatore