Security Fix(es):
A vulnerability was found in OWASP ModSecurity up to 2.9.9. It has been declared as critical.The manipulation of the argument sanitiseArg/sanitizeArg with an unknown input leads to a unknown weakness. The CWE definition for the vulnerability is CWE-1050. The product has a loop body or loop condition that contains a control element that directly or indirectly consumes platform resources, e.g. messaging, sessions, locks, or file descriptors.As an impact it is known to affect availability.Upgrading to version 2.9.10 eliminates this vulnerability.(CVE-2025-48866)
A vulnerability was found in OWASP ModSecurity 2.9.8/2.9.10 and classified as critical.Using CWE to declare the problem leads to CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Impacted is availability.Upgrading to version 2.9.11 eliminates this vulnerability.(CVE-2025-52891)
{
"severity": "High"
}{
"aarch64": [
"mod_security-2.9.11-1.oe2403sp2.aarch64.rpm",
"mod_security-debuginfo-2.9.11-1.oe2403sp2.aarch64.rpm",
"mod_security-debugsource-2.9.11-1.oe2403sp2.aarch64.rpm"
],
"src": [
"mod_security-2.9.11-1.oe2403sp2.src.rpm"
],
"x86_64": [
"mod_security-2.9.11-1.oe2403sp2.x86_64.rpm",
"mod_security-debuginfo-2.9.11-1.oe2403sp2.x86_64.rpm",
"mod_security-debugsource-2.9.11-1.oe2403sp2.x86_64.rpm"
]
}