Your message dated Sun, 02 Oct 2011 10:47:39 +0000
with message-id <[email protected]>
and subject line Bug#640837: fixed in modsecurity-crs 2.2.2-1
has caused the Debian Bug report #640837,
regarding modsecurity-crs: Ruleset with REQBODY_ERROR depends on 
libapache2-modsecurity >= 2.6.0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
640837: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640837
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: modsecurity-crs
Version: 2.2.0-1
Severity: normal


Using wheezy packages:
libapache-mod-security/wheezy uptodate 2.5.13-1
libapache2-modsecurity/wheezy uptodate 2.5.13-1
modsecurity-crs/wheezy uptodate 2.2.0-1

and following instructions to include core ruleset in 
/usr/share/doc/modsecurity-crs/README.Debian

apache2ctl configtest gives:
Syntax error on line 91 of 
/usr/share/modsecurity-crs/base_rules/modsecurity_crs_20_protocol_violations.conf:
Error creating rule: Unknown variable: REQBODY_ERROR

http://comments.gmane.org/gmane.comp.apache.mod-security.owasp-crs/283 states
"Ah, I guess you aren't using ModSecurity v2.6.0. You should use the older 
variable name then - REQBODY_PROCESSOR_ERROR"

Either libapache2-modsecurity 2.6.0 should be a dependency or this change 
should be made (works fine patched).

-- System Information:
Debian Release: 6.0.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'oldstable'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash



--- End Message ---
--- Begin Message ---
Source: modsecurity-crs
Source-Version: 2.2.2-1

We believe that the bug you reported is fixed in the latest version of
modsecurity-crs, which is due to be installed in the Debian FTP archive:

modsecurity-crs_2.2.2-1.debian.tar.gz
  to main/m/modsecurity-crs/modsecurity-crs_2.2.2-1.debian.tar.gz
modsecurity-crs_2.2.2-1.dsc
  to main/m/modsecurity-crs/modsecurity-crs_2.2.2-1.dsc
modsecurity-crs_2.2.2-1_all.deb
  to main/m/modsecurity-crs/modsecurity-crs_2.2.2-1_all.deb
modsecurity-crs_2.2.2.orig.tar.gz
  to main/m/modsecurity-crs/modsecurity-crs_2.2.2.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alberto Gonzalez Iniesta <[email protected]> (supplier of updated 
modsecurity-crs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sun, 02 Oct 2011 12:16:35 +0200
Source: modsecurity-crs
Binary: modsecurity-crs
Architecture: source all
Version: 2.2.2-1
Distribution: unstable
Urgency: low
Maintainer: Alberto Gonzalez Iniesta <[email protected]>
Changed-By: Alberto Gonzalez Iniesta <[email protected]>
Description: 
 modsecurity-crs - modsecurity's Core Rule Set
Closes: 640837
Changes: 
 modsecurity-crs (2.2.2-1) unstable; urgency=low
 .
   * New upstream release
   * Added >= 2.6.0 to libapache2-modsecurity dependency (Closes: #640837)
Checksums-Sha1: 
 495b511c04872d2926fecf096940abdad35f27e4 1132 modsecurity-crs_2.2.2-1.dsc
 60efc8df5210ada0f3ab2d5ef5f93979675be19c 291713 
modsecurity-crs_2.2.2.orig.tar.gz
 423efe6182824ce2c9aedeb5c82419809d62840d 3158 
modsecurity-crs_2.2.2-1.debian.tar.gz
 48c8609d75e02f140f35b4284f4475671ce49422 181114 modsecurity-crs_2.2.2-1_all.deb
Checksums-Sha256: 
 4bd2660ac1fd52ccecffd98cd3dfae4703c4b6a5fea1850f7dfef6c3a667834d 1132 
modsecurity-crs_2.2.2-1.dsc
 5b3e3187b49be3dc5ba026b39f2f76cf4a76b0d6cf9077fc0f650ec52d59e52a 291713 
modsecurity-crs_2.2.2.orig.tar.gz
 ec117d05c126977a366e167f28f9777926885e4302a800c6ddd9b07e62525697 3158 
modsecurity-crs_2.2.2-1.debian.tar.gz
 9ed514908c20a9a863c0832eef6e978e405678d2922a57d9c572c7368bf8e0ae 181114 
modsecurity-crs_2.2.2-1_all.deb
Files: 
 f9d566d64f5ded365ec3e9aea4225d66 1132 httpd extra modsecurity-crs_2.2.2-1.dsc
 a8d35ed2ff3f6f0224af912a79fb8b54 291713 httpd extra 
modsecurity-crs_2.2.2.orig.tar.gz
 f36921370b1825f53daf29171f3cc3d7 3158 httpd extra 
modsecurity-crs_2.2.2-1.debian.tar.gz
 75162540cc8188556b02a55c4d7b6cbf 181114 httpd extra 
modsecurity-crs_2.2.2-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk6IPK4ACgkQxRSvjkukAcM/dwCcDQPqCNdbBOGNFJjx0o+/eJzk
CPwAni11eBoe7HJ5kjK25IdMe57d2/0Q
=c7b+
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to