Description of problem: Modsecurity 2.7.4 was released today, according to the changelog there a null pointer dereference flaw ..... Security Issues: * Fixed Remote Null Pointer DeReference (CVE-2013-2765). When forceRequestBodyVariable action is triggered and a unknown Content-Type is used, mod_security will crash trying to manipulate msr->msc_reqbody_chunks->elts however msr->msc_reqbody_chunks is NULL. (Thanks Younes JAAIDI). ...... URL: https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES
PS. I'm mod_security maintainer, I'll prepare an update once the child bugreports for fedora and epel are created. Thanks.
Relevant upstream patch: https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba Other references: http://sourceforge.net/mailarchive/message.php?msg_id=30900019
This issue affects the versions of the mod_security package, as shipped with Fedora release of 17 and 18. Please schedule an update. -- This issue affects the versions of the mod_security package, as shipped with Fedora EPEL-5 and Fedora EPEL-6. Please schedule an update.
Created mod_security tracking bugs for this issue Affects: fedora-all [bug 967775] Affects: epel-all [bug 967776]
mod_security-2.7.3-2.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
mod_security-2.7.3-2.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
mod_security-2.7.3-2.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
mod_security-2.7.3-2.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
mod_security-2.6.8-4.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.