This bug was fixed in the package libapache-mod-security - 2.5.11-1ubuntu0.1
--------------- libapache-mod-security (2.5.11-1ubuntu0.1) lucid-security; urgency=low * SECURITY UPDATE: bypass multipart filtering using invalid quoting (LP: #1016909) - debian/patches/CVE-2012-2751: Fix detection of invalid quotes. Thanks to Alberto Gonzalez Iniesta for the backported patch - Patch taken from Oneiric package - CVE-2012-2751 * SECURITY UPDATE: disclosure of local files or denial of service by resource exhaustion via XML External Entity (XEE) attacks (LP: #1169030) - debian/patches/CVE-2013-1915.patch: Add an option to allow loading external entities (disabled by default). Backported from upstream patch - d4d80b38aa85eccb26e3c61b04d16e8ca5de76fe - CVE-2013-1915 -- Evan Broder <e...@stripe.com> Tue, 16 Apr 2013 09:05:37 -0700 ** Changed in: libapache-mod-security (Ubuntu) Status: Incomplete => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-1915 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016909 Title: (CVE-2009-5031) <modsecurity-apache-2.6.6 : Multipart Quote Parsing Security Bypass Vulnerability (CVE-2009-5031 CVE-2012-2751) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libapache-mod-security/+bug/1016909/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs