Bug 1150614
Summary: | RFE Rebase mod_security_crs | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Martin Poole <mpoole> |
Component: | mod_security_crs | Assignee: | Daniel Kopeček <dkopecek> |
Status: | CLOSED ERRATA | QA Contact: | Martin Frodl <mfrodl> |
Severity: | high | Docs Contact: | Mirek Jahoda <mjahoda> |
Priority: | high | ||
Version: | 7.0 | CC: | bressers, cww, dkopecek, ehamon, isenfeld, lmiksik, martin, pbajenez, pvrabec, rdoty, rkratky, vanhoof |
Target Milestone: | rc | Keywords: | FutureFeature, Rebase |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | mod_security_crs-2.2.9-1.el7 | Doc Type: | Rebase: Bug Fixes and Enhancements |
Doc Text: |
_mod_security_crs_ rebased to version 2.2.9
The _mod_security_crs_ package has been upgraded to upstream version 2.2.9, which provides a number of bug fixes and enhancements over the previous version. Notable changes include:
* A new PHP rule (958977) to detect PHP exploits.
* A `JS overrides` file to identify successful XSS probes.
* New XSS detection rules.
* Fixed session-hijacking rules.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2016-11-04 01:37:12 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1203710, 1296594, 1313485 |
Description
Martin Poole
2014-10-08 14:07:53 UTC
Hi Dan, This bug has been selected for inclusion in 7.3 Release Notes. Could you please add info to the Docs Text field, so that I can use it to formulate the release note? Thanks. Hi Daniel, Josh Bressers requested the inclusion of this in the RN on 2016-03-13. Perhaps the reason is that it's a request from a strategic customer? Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHEA-2016-2248.html |