Hmmmmmm, now attached. Sorry for the noise.

On Tue, May 27, 2025 at 10:51:56PM +0200, Alberto Gonzalez Iniesta wrote:
> Hi, all.
> 
> I just requested the unblock for trixie.
> 
> Please find attached the debdiffs for both bullseye-security and
> bookworm-security. I'll wait for the OK to upload them.
> 
> Thanks,
> 
> Alberto
> 
> On Fri, May 23, 2025 at 09:52:38PM +0200, Salvatore Bonaccorso wrote:
> > Hi
> > 
> > [looping in the Debian security team alias]
> > 
> > On Fri, May 23, 2025 at 09:25:36PM +0200, Ervin Hegedüs wrote:
> > > Hi Alberto,
> > > 
> > > Unfortunately I dont know what's the SPU. And as I know there is no DSA,
> > > just a bug id.
> > 
> > spu is stable-proposed-update. The issue might warrant a DSA, can you
> > prepare an update to go via bookworm-security and send a debdiff for
> > the update to the security team?
> > 
> > Please make sure the package get as well unblocked for trixie. As the
> > package has no autopkgtests it needs a manual unblock at this stage of
> > the freeze for trixie.
> > 
> > Regards,
> > Salvatore
> 

-- 
Alberto Gonzalez Iniesta    | Formación, consultoría y soporte técnico
a...@inittab.org             | en GNU/Linux y software libre
Encrypted mail preferred    | http://inittab.org

Key fingerprint = 5347 CBD8 3E30 A9EB 4D7D  4BF2 009B 3375 6B9A AA55
diff -Nru modsecurity-apache-2.9.7/debian/changelog 
modsecurity-apache-2.9.7/debian/changelog
--- modsecurity-apache-2.9.7/debian/changelog   2023-01-23 11:39:50.000000000 
+0100
+++ modsecurity-apache-2.9.7/debian/changelog   2025-05-23 14:55:57.000000000 
+0200
@@ -1,3 +1,10 @@
+modsecurity-apache (2.9.7-1+deb12u1) bookworm-security; urgency=medium
+
+  * Fix CVE-2025-47497: Added d/patches/cve-2025-47497.patch
+    (Closes: #1106286)
+
+ -- Ervin Hegedüs <airw...@gmail.com>  Fri, 23 May 2025 14:55:57 +0200
+
 modsecurity-apache (2.9.7-1) unstable; urgency=medium
 
   * New upstream version 2.9.7
diff -Nru modsecurity-apache-2.9.7/debian/patches/cve-2025-47947.patch 
modsecurity-apache-2.9.7/debian/patches/cve-2025-47947.patch
--- modsecurity-apache-2.9.7/debian/patches/cve-2025-47947.patch        
1970-01-01 01:00:00.000000000 +0100
+++ modsecurity-apache-2.9.7/debian/patches/cve-2025-47947.patch        
2025-05-23 14:55:57.000000000 +0200
@@ -0,0 +1,48 @@
+Description: Patch for CVE-2025-47947
+Author: Ervin Hegedüs <airw...@gmail.com>
+Last-Update: 2025-05-23
+---
+This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
+--- a/apache2/modsecurity.h
++++ b/apache2/modsecurity.h
+@@ -694,6 +694,7 @@
+     unsigned int             value_origin_offset;
+     unsigned int             value_origin_len;
+     const char              *origin;
++    unsigned int             marked_for_sanitization;
+ };
+ 
+ struct msc_string {
+--- a/apache2/msc_json.c
++++ b/apache2/msc_json.c
+@@ -67,6 +67,7 @@
+         return 0;
+     }
+ 
++    arg->marked_for_sanitization = 0;
+     apr_table_addn(msr->arguments,
+         log_escape_nq_ex(msr->mp, arg->name, arg->name_len), (void *) arg);
+ 
+--- a/apache2/msc_parsers.c
++++ b/apache2/msc_parsers.c
+@@ -340,6 +340,7 @@
+  */
+ void add_argument(modsec_rec *msr, apr_table_t *arguments, msc_arg *arg)
+ {
++    arg->marked_for_sanitization = 0;
+     if (msr->txcfg->debuglog_level >= 5) {
+         msr_log(msr, 5, "Adding request argument (%s): name \"%s\", value 
\"%s\"",
+                 arg->origin, log_escape_ex(msr->mp, arg->name, arg->name_len),
+--- a/apache2/re_actions.c
++++ b/apache2/re_actions.c
+@@ -1413,8 +1413,9 @@
+             telts = (const apr_table_entry_t*)tarr->elts;
+             for (i = 0; i < tarr->nelts; i++) {
+                 msc_arg *arg = (msc_arg *)telts[i].val;
+-                if (strcasecmp(sargname, arg->name) == 0) {
++                if (arg->marked_for_sanitization == 0 && strcasecmp(sargname, 
arg->name) == 0) {
+                     apr_table_addn(msr->arguments_to_sanitize, arg->name, 
(void *)arg);
++                    arg->marked_for_sanitization = 1;
+                 }
+             }
+             break;
diff -Nru modsecurity-apache-2.9.7/debian/patches/series 
modsecurity-apache-2.9.7/debian/patches/series
--- modsecurity-apache-2.9.7/debian/patches/series      2023-01-23 
11:39:50.000000000 +0100
+++ modsecurity-apache-2.9.7/debian/patches/series      2025-05-23 
14:55:57.000000000 +0200
@@ -1,2 +1,3 @@
 debian_log_dir.patch
 improve_defaults.patch
+cve-2025-47947.patch
diff -Nru modsecurity-apache-2.9.3/debian/changelog 
modsecurity-apache-2.9.3/debian/changelog
--- modsecurity-apache-2.9.3/debian/changelog   2023-01-27 10:09:29.000000000 
+0100
+++ modsecurity-apache-2.9.3/debian/changelog   2025-05-23 14:06:46.000000000 
+0200
@@ -1,3 +1,10 @@
+modsecurity-apache (2.9.3-3+deb11u3) bullseye-security; urgency=medium
+
+  * Fix CVE-2025-47497: Added d/patches/cve-2025-47497.patch
+    (Closes: #1106286)
+
+ -- Ervin Hegedüs <airw...@gmail.com>  Fri, 23 May 2025 14:06:46 +0200
+
 modsecurity-apache (2.9.3-3+deb11u2) bullseye; urgency=medium
 
   * Non-maintainer upload by the LTS security team.
diff -Nru modsecurity-apache-2.9.3/debian/patches/cve-2025-47947.patch 
modsecurity-apache-2.9.3/debian/patches/cve-2025-47947.patch
--- modsecurity-apache-2.9.3/debian/patches/cve-2025-47947.patch        
1970-01-01 01:00:00.000000000 +0100
+++ modsecurity-apache-2.9.3/debian/patches/cve-2025-47947.patch        
2025-05-23 14:06:46.000000000 +0200
@@ -0,0 +1,48 @@
+Description: Patch for CVE-2025-47947
+Author: Ervin Hegedüs <airw...@gmail.com>
+Last-Update: 2025-05-23
+---
+This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
+--- a/apache2/modsecurity.h
++++ b/apache2/modsecurity.h
+@@ -686,6 +686,7 @@
+     unsigned int             value_origin_offset;
+     unsigned int             value_origin_len;
+     const char              *origin;
++    unsigned int             marked_for_sanitization;
+ };
+ 
+ struct msc_string {
+--- a/apache2/msc_json.c
++++ b/apache2/msc_json.c
+@@ -59,6 +59,7 @@
+             arg->name, arg->value);
+     }
+ 
++    arg->marked_for_sanitization = 0;
+     apr_table_addn(msr->arguments,
+         log_escape_nq_ex(msr->mp, arg->name, arg->name_len), (void *) arg);
+ 
+--- a/apache2/msc_parsers.c
++++ b/apache2/msc_parsers.c
+@@ -340,6 +340,7 @@
+  */
+ void add_argument(modsec_rec *msr, apr_table_t *arguments, msc_arg *arg)
+ {
++    arg->marked_for_sanitization = 0;
+     if (msr->txcfg->debuglog_level >= 5) {
+         msr_log(msr, 5, "Adding request argument (%s): name \"%s\", value 
\"%s\"",
+                 arg->origin, log_escape_ex(msr->mp, arg->name, arg->name_len),
+--- a/apache2/re_actions.c
++++ b/apache2/re_actions.c
+@@ -1404,8 +1404,9 @@
+             telts = (const apr_table_entry_t*)tarr->elts;
+             for (i = 0; i < tarr->nelts; i++) {
+                 msc_arg *arg = (msc_arg *)telts[i].val;
+-                if (strcasecmp(sargname, arg->name) == 0) {
++                if (arg->marked_for_sanitization == 0 && strcasecmp(sargname, 
arg->name) == 0) {
+                     apr_table_addn(msr->arguments_to_sanitize, arg->name, 
(void *)arg);
++                    arg->marked_for_sanitization = 1;
+                 }
+             }
+             break;
diff -Nru modsecurity-apache-2.9.3/debian/patches/series 
modsecurity-apache-2.9.3/debian/patches/series
--- modsecurity-apache-2.9.3/debian/patches/series      2023-01-27 
10:09:29.000000000 +0100
+++ modsecurity-apache-2.9.3/debian/patches/series      2025-05-23 
14:06:46.000000000 +0200
@@ -4,3 +4,5 @@
 json_depth_limit.patch
 multipart_part_headers.patch
 CVE-2023-24021_FILES_TMP_CONTENT.patch
+cve-2025-47947.patch
+

Reply via email to