Debian Package Tracker
Register | Log in
Subscribe

modsecurity

Choose email to subscribe with

general
  • source: modsecurity (main)
  • version: 3.0.15-1
  • maintainer: Ervin Hegedus (DMD)
  • uploaders: Alberto Gonzalez Iniesta [DMD]
  • arch: any
  • std-ver: 4.6.1
  • VCS: Git (QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 3.0.4-2
  • oldstable: 3.0.9-1+deb12u1
  • stable: 3.0.14-1
  • testing: 3.0.15-1
  • unstable: 3.0.15-1
versioned links
  • 3.0.4-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.0.9-1+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.0.14-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.0.15-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libmodsecurity-dev
  • libmodsecurity3t64
action needed
2 security issues in trixie high

There are 2 open security issues in trixie.

2 important issues:
  • CVE-2026-30923: ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Libmodsecurity is one component of the ModSecurity v3 project. A segmentation fault occurs when a rule using the t:hexDecode transformation inspects a query string parameter containing a single character. An attacker can exploit this to crash worker processes, causing a denial of service. Service resumes once the attack stops as worker processes recover from the segfault. All versions before 3.0.15 of libModSecurity3 are affected. This has been patched in version 3.0.15.
  • CVE-2026-42268: ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. From 3.0.0 to before 3.0.15, there is an unhandled exception (std::out_of_range) caused by unsigned integer underflow in libmodsecurity3 if the user (administrator) uses a rule any of @verifySSN, @verifyCPF, or @verifySVNR. This vulnerability is fixed in 3.0.15.
Created: 2026-05-06 Last update: 2026-05-18 22:01
3 security issues in bookworm high

There are 3 open security issues in bookworm.

2 important issues:
  • CVE-2026-30923: ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Libmodsecurity is one component of the ModSecurity v3 project. A segmentation fault occurs when a rule using the t:hexDecode transformation inspects a query string parameter containing a single character. An attacker can exploit this to crash worker processes, causing a denial of service. Service resumes once the attack stops as worker processes recover from the segfault. All versions before 3.0.15 of libModSecurity3 are affected. This has been patched in version 3.0.15.
  • CVE-2026-42268: ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. From 3.0.0 to before 3.0.15, there is an unhandled exception (std::out_of_range) caused by unsigned integer underflow in libmodsecurity3 if the user (administrator) uses a rule any of @verifySSN, @verifyCPF, or @verifySVNR. This vulnerability is fixed in 3.0.15.
1 issue left for the package maintainer to handle:
  • CVE-2024-1019: (needs triaging) ModSecurity / libModSecurity 3.0.0 to 3.0.11 is affected by a WAF bypass for path-based payloads submitted via specially crafted request URLs. ModSecurity v3 decodes percent-encoded characters present in request URLs before it separates the URL path component from the optional query string component. This results in an impedance mismatch versus RFC compliant back-end applications. The vulnerability hides an attack payload in the path component of the URL from WAF rules inspecting it. A back-end may be vulnerable if it uses the path component of request URLs to construct queries. Integrators and users are advised to upgrade to 3.0.12. The ModSecurity v2 release line is not affected by this vulnerability.

You can find information about how to handle this issue in the security team's documentation.

Created: 2024-01-31 Last update: 2026-05-18 22:01
1 new commit since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit 300e490ba22ccccbca1e019ecfd26c6feb831c80
Author: Alberto Gonzalez Iniesta <agi@inittab.org>
Date:   Wed May 6 17:41:27 2026 +0200

    Target unstable, add CVEs
Created: 2024-02-04 Last update: 2026-05-18 18:02
lintian reports 7 warnings normal
Lintian reports 7 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-05-07 Last update: 2026-05-07 17:02
debian/patches: 2 patches to forward upstream low

Among the 2 debian patches available in version 3.0.15-1 of the package, we noticed the following issues:

  • 2 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-03-19 Last update: 2026-05-07 14:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.6.1).
Created: 2022-12-17 Last update: 2026-05-07 10:47
news
[rss feed]
  • [2026-05-12] modsecurity 3.0.15-1 MIGRATED to testing (Debian testing watch)
  • [2026-05-07] Accepted modsecurity 3.0.15-1 (source) into unstable (Ervin Hegedus) (signed by: Alberto Gonzalez Iniesta)
  • [2025-03-09] modsecurity 3.0.14-1 MIGRATED to testing (Debian testing watch)
  • [2025-03-03] Accepted modsecurity 3.0.14-1 (source) into unstable (Ervin Hegedüs) (signed by: Alberto Gonzalez Iniesta)
  • [2024-09-14] modsecurity 3.0.13-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-09] Accepted modsecurity 3.0.13-1 (source) into unstable (Ervin Hegedüs) (signed by: Alberto Gonzalez Iniesta)
  • [2024-05-03] modsecurity 3.0.12-1.1 MIGRATED to testing (Debian testing watch)
  • [2024-02-28] Accepted modsecurity 3.0.12-1.1 (source) into unstable (Benjamin Drung)
  • [2024-02-11] modsecurity 3.0.12-1 MIGRATED to testing (Debian testing watch)
  • [2024-02-11] modsecurity 3.0.12-1 MIGRATED to testing (Debian testing watch)
  • [2024-02-04] Accepted modsecurity 3.0.12-1.1~exp1 (source) into experimental (Graham Inggs)
  • [2024-01-31] Accepted modsecurity 3.0.12-1 (source) into unstable (Ervin Hegedüs) (signed by: Alberto Gonzalez Iniesta)
  • [2023-12-18] modsecurity 3.0.11-1 MIGRATED to testing (Debian testing watch)
  • [2023-12-12] Accepted modsecurity 3.0.11-1 (source) into unstable (Ervin Hegedüs) (signed by: Alberto Gonzalez Iniesta)
  • [2023-09-27] Accepted modsecurity 3.0.9-1+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Alberto Gonzalez Iniesta)
  • [2023-08-06] modsecurity 3.0.10-1 MIGRATED to testing (Debian testing watch)
  • [2023-07-31] Accepted modsecurity 3.0.10-1 (source) into unstable (Ervin Hegedüs) (signed by: Alberto Gonzalez Iniesta)
  • [2023-06-04] modsecurity 3.0.9-1 MIGRATED to testing (Debian testing watch)
  • [2023-04-30] Accepted modsecurity 3.0.9-1 (source) into unstable (Alberto Gonzalez Iniesta)
  • [2023-04-24] Accepted modsecurity 3.0.8-3 (source) into unstable (Alberto Gonzalez Iniesta)
  • [2023-03-18] Accepted modsecurity 3.0.8-2 (source) into unstable (Ervin Hegedüs) (signed by: Alberto Gonzalez Iniesta)
  • [2022-09-15] modsecurity 3.0.8-1 MIGRATED to testing (Debian testing watch)
  • [2022-09-10] Accepted modsecurity 3.0.8-1 (source) into unstable (Ervin Hegedus) (signed by: Alberto Gonzalez Iniesta)
  • [2021-11-30] modsecurity 3.0.6-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-25] Accepted modsecurity 3.0.6-1 (source) into unstable (Ervin Hegedus) (signed by: Alberto Gonzalez Iniesta)
  • [2020-09-19] Accepted modsecurity 3.0.3-1+deb10u2 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Alberto Gonzalez Iniesta)
  • [2020-09-18] Accepted modsecurity 3.0.3-1+deb10u2 (source) into stable->embargoed, stable (Debian FTP Masters) (signed by: Alberto Gonzalez Iniesta)
  • [2020-09-18] modsecurity 3.0.4-2 MIGRATED to testing (Debian testing watch)
  • [2020-09-16] Accepted modsecurity 3.0.4-2 (source) into unstable (Ervin Hegedüs) (signed by: Alberto Gonzalez Iniesta)
  • [2020-01-27] modsecurity 3.0.4-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 2
  • RC: 0
  • I&N: 0
  • M&W: 2
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 7)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.0.14-1build2

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing