Your message dated Fri, 9 Mar 2012 13:58:05 +0100
with message-id <[email protected]>
and subject line Newer CRS do not work with modsecurity < 2.6.0
has caused the Debian Bug report #662947,
regarding libapache-mod-security: Rule execution error - PCRE limits exceeded 
(-8): (null)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
662947: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662947
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: libapache-mod-security
Version: 2.5.12-1
Severity: normal

Hi,

I'm getting this message on multiple web pages:
| Message: Rule execution error - PCRE limits exceeded (-8): (null).
| Message: Access denied with code 403 (phase 2). Match of "streq 0"
|   against"TX:MSC_PCRE_LIMITS_EXCEEDED" required. [file
|   "/etc/modsecurity/00debian7.conf"] [line "93"] [msg "ModSecurity
|   internal error flagged: TX:MSC_PCRE_LIMITS_EXCEEDED"]
| Action: Intercepted (phase 2)
| Stopwatch: 1331122914310502 8477 (1514 8124 -)
| Producer: ModSecurity for Apache/2.5.12 (http://www.modsecurity.org/); core 
ruleset/2.2.3.
| Server: Apache/2.2.16 (Debian)

The file 00debian7.conf is in fact 'modsecurity.conf-recommended' from
Debian package version 2.6.3-1 with small changes to make it start with
libapache-mod-security from Debian 6.0.
# s%REQBODY_ERROR%REQBODY_PROCESSOR_ERROR%
# s%^\(SecRequestBodyLimitAction\)%#\1%

These are caused by legitimate web access requests.
Removing/disabling SecPcreMatchLimit parameters doesn't change anything.
Increasing to 10000000 doesn't help either. Thus, this appears to be
an internal error of ModSecurity.

Thanks

-- System Information:
Debian Release: 6.0.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libapache-mod-security depends on:
ii  apache2.2-common   2.2.16-6+squeeze6     Apache HTTP Server common files
ii  libc6              2.11.3-3              Embedded GNU C Library: Shared lib
ii  liblua5.1-0        5.1.4-5               Simple, extensible, embeddable pro
ii  libpcre3           8.02-1.1              Perl 5 Compatible Regular Expressi
ii  libxml2            2.7.8.dfsg-2+squeeze3 GNOME XML library
ii  mod-security-commo 2.5.12-1              Tighten web applications security 

libapache-mod-security recommends no packages.

libapache-mod-security suggests no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Hi,

As Teodor stated newer core ruleset (> 2.2.0) do not work (properly)
with old modsecurity (< 2.6.0).

I (or others) may work on a backport (that should be asked using the
backports list, not this bug report) if there's enough demand.

Alberto

-- 
Alberto Gonzalez Iniesta    | Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred    | http://inittab.com

Key fingerprint = 9782 04E7 2B75 405C F5E9  0C81 C514 AF8E 4BA4 01C3


--- End Message ---

Reply via email to