Your message dated Sun, 02 Oct 2011 10:47:39 +0000
with message-id <[email protected]>
and subject line Bug#640837: fixed in modsecurity-crs 2.2.2-1
has caused the Debian Bug report #640837,
regarding modsecurity-crs: Ruleset with REQBODY_ERROR depends on
libapache2-modsecurity >= 2.6.0
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
640837: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640837
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: modsecurity-crs
Version: 2.2.0-1
Severity: normal
Using wheezy packages:
libapache-mod-security/wheezy uptodate 2.5.13-1
libapache2-modsecurity/wheezy uptodate 2.5.13-1
modsecurity-crs/wheezy uptodate 2.2.0-1
and following instructions to include core ruleset in
/usr/share/doc/modsecurity-crs/README.Debian
apache2ctl configtest gives:
Syntax error on line 91 of
/usr/share/modsecurity-crs/base_rules/modsecurity_crs_20_protocol_violations.conf:
Error creating rule: Unknown variable: REQBODY_ERROR
http://comments.gmane.org/gmane.comp.apache.mod-security.owasp-crs/283 states
"Ah, I guess you aren't using ModSecurity v2.6.0. You should use the older
variable name then - REQBODY_PROCESSOR_ERROR"
Either libapache2-modsecurity 2.6.0 should be a dependency or this change
should be made (works fine patched).
-- System Information:
Debian Release: 6.0.2
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'oldstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.26-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
--- End Message ---
--- Begin Message ---
Source: modsecurity-crs
Source-Version: 2.2.2-1
We believe that the bug you reported is fixed in the latest version of
modsecurity-crs, which is due to be installed in the Debian FTP archive:
modsecurity-crs_2.2.2-1.debian.tar.gz
to main/m/modsecurity-crs/modsecurity-crs_2.2.2-1.debian.tar.gz
modsecurity-crs_2.2.2-1.dsc
to main/m/modsecurity-crs/modsecurity-crs_2.2.2-1.dsc
modsecurity-crs_2.2.2-1_all.deb
to main/m/modsecurity-crs/modsecurity-crs_2.2.2-1_all.deb
modsecurity-crs_2.2.2.orig.tar.gz
to main/m/modsecurity-crs/modsecurity-crs_2.2.2.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Alberto Gonzalez Iniesta <[email protected]> (supplier of updated
modsecurity-crs package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Sun, 02 Oct 2011 12:16:35 +0200
Source: modsecurity-crs
Binary: modsecurity-crs
Architecture: source all
Version: 2.2.2-1
Distribution: unstable
Urgency: low
Maintainer: Alberto Gonzalez Iniesta <[email protected]>
Changed-By: Alberto Gonzalez Iniesta <[email protected]>
Description:
modsecurity-crs - modsecurity's Core Rule Set
Closes: 640837
Changes:
modsecurity-crs (2.2.2-1) unstable; urgency=low
.
* New upstream release
* Added >= 2.6.0 to libapache2-modsecurity dependency (Closes: #640837)
Checksums-Sha1:
495b511c04872d2926fecf096940abdad35f27e4 1132 modsecurity-crs_2.2.2-1.dsc
60efc8df5210ada0f3ab2d5ef5f93979675be19c 291713
modsecurity-crs_2.2.2.orig.tar.gz
423efe6182824ce2c9aedeb5c82419809d62840d 3158
modsecurity-crs_2.2.2-1.debian.tar.gz
48c8609d75e02f140f35b4284f4475671ce49422 181114 modsecurity-crs_2.2.2-1_all.deb
Checksums-Sha256:
4bd2660ac1fd52ccecffd98cd3dfae4703c4b6a5fea1850f7dfef6c3a667834d 1132
modsecurity-crs_2.2.2-1.dsc
5b3e3187b49be3dc5ba026b39f2f76cf4a76b0d6cf9077fc0f650ec52d59e52a 291713
modsecurity-crs_2.2.2.orig.tar.gz
ec117d05c126977a366e167f28f9777926885e4302a800c6ddd9b07e62525697 3158
modsecurity-crs_2.2.2-1.debian.tar.gz
9ed514908c20a9a863c0832eef6e978e405678d2922a57d9c572c7368bf8e0ae 181114
modsecurity-crs_2.2.2-1_all.deb
Files:
f9d566d64f5ded365ec3e9aea4225d66 1132 httpd extra modsecurity-crs_2.2.2-1.dsc
a8d35ed2ff3f6f0224af912a79fb8b54 291713 httpd extra
modsecurity-crs_2.2.2.orig.tar.gz
f36921370b1825f53daf29171f3cc3d7 3158 httpd extra
modsecurity-crs_2.2.2-1.debian.tar.gz
75162540cc8188556b02a55c4d7b6cbf 181114 httpd extra
modsecurity-crs_2.2.2-1_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAk6IPK4ACgkQxRSvjkukAcM/dwCcDQPqCNdbBOGNFJjx0o+/eJzk
CPwAni11eBoe7HJ5kjK25IdMe57d2/0Q
=c7b+
-----END PGP SIGNATURE-----
--- End Message ---