Security Fix(es):
A vulnerability was found in OWASP ModSecurity up to 2.9.9. It has been declared as critical.The manipulation of the argument sanitiseArg/sanitizeArg with an unknown input leads to a unknown weakness. The CWE definition for the vulnerability is CWE-1050. The product has a loop body or loop condition that contains a control element that directly or indirectly consumes platform resources, e.g. messaging, sessions, locks, or file descriptors.As an impact it is known to affect availability.Upgrading to version 2.9.10 eliminates this vulnerability.(CVE-2025-48866)
A vulnerability was found in OWASP ModSecurity 2.9.8/2.9.10 and classified as critical.Using CWE to declare the problem leads to CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Impacted is availability.Upgrading to version 2.9.11 eliminates this vulnerability.(CVE-2025-52891)
{ "severity": "High" }
{ "src": [ "mod_security-2.9.11-1.oe2403sp2.src.rpm" ], "aarch64": [ "mod_security-2.9.11-1.oe2403sp2.aarch64.rpm", "mod_security-debuginfo-2.9.11-1.oe2403sp2.aarch64.rpm", "mod_security-debugsource-2.9.11-1.oe2403sp2.aarch64.rpm" ], "x86_64": [ "mod_security-2.9.11-1.oe2403sp2.x86_64.rpm", "mod_security-debuginfo-2.9.11-1.oe2403sp2.x86_64.rpm", "mod_security-debugsource-2.9.11-1.oe2403sp2.x86_64.rpm" ] }