Bug 2190381 (CVE-2023-28882)

Summary: CVE-2023-28882 mod_security: a segfault and a resultant crash of a worker process in some configurations with certain inputs
Product: [Other] Security Response Reporter: Sandipan Roy <saroy>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: csutherl, jclere, luhliari, mturk, peholase, pjindal, plodge, szappis
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: mod_security 3.0.9 Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in Mod Security. When certain inputs are used in certain configurations, this issue can result in a segfault and cause a worker process crash. A high volume of these requests sent quickly can lead to the server becoming slow or unresponsive to legitimate requests.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-04-28 13:40:06 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2190378    

Description Sandipan Roy 2023-04-28 08:42:32 UTC
Trustwave ModSecurity 3.0.5 through 3.0.8 before 3.0.9 allows a denial of service (worker crash and unresponsiveness) because some inputs cause a segfault in the Transaction class for some configurations.

https://www.trustwave.com/en-us/resources/security-resources/software-updates/announcing-modsecurity-version-309/
https://github.com/SpiderLabs/ModSecurity/pull/2886/commits/db84d8cf771d39db578707cd03ec2b60f74c9785

Comment 1 Product Security DevOps Team 2023-04-28 13:40:04 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-28882