Debian 10796 Published by

Several security updates have been released for Debian GNU/Linux, including a fix for modsecurity-crs for Debian 10 and 11 to prevent attackers from bypassing web application firewalls. The issue, known as "Content-Type confusion," occurs when multiple Content-Type request headers are not properly detected on some platforms. Additionally, a buffer overflow was discovered in the libvpx library for Debian 11, which could result in denial of service or potentially allow arbitrary code execution. Users are recommended to upgrade their modsecurity-crs and libvpx packages to the latest versions to address these security issues.

[DLA 4488-1] modsecurity-crs security update
ELA-1651-1 modsecurity-crs security update
[DLA 4489-1] libvpx security update




[SECURITY] [DLA 4488-1] modsecurity-crs security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-4488-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Tobias Frost
February 22, 2026 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : modsecurity-crs
Version : 3.3.4-1~deb11u2
CVE ID : CVE-2023-38199 CVE-2026-21876
Debian Bug : 1041109 1125084

Multiple issues have been fixed in modsecurity-crs, a set of generic
attack detection rules for use with ModSecurity.

CVE-2023-38199

Coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not
detect multiple Content-Type request headers on some platforms. This
might allow attackers to bypass a WAF with a crafted payload, aka
"Content-Type confusion" between the WAF and the backend application.
This occurs when the web application relies on only the last
Content-Type header. Other platforms may reject the additional
Content-Type header or merge conflicting headers, leading to detection
as a malformed header.

CVE-2026-21876

The current rule 922110 has a bug when processing multipart requests
with multiple parts. When the first rule in a chain iterates over a
collection (like `MULTIPART_PART_HEADERS`), the capture variables
(`TX:0`, `TX:1`) get overwritten with each iteration. Only the last
captured value is available to the chained rule, which means malicious
charsets in earlier parts can be missed if a later part has a legitimate
charset.

For Debian 11 bullseye, these problems have been fixed in version
3.3.4-1~deb11u2.

We recommend that you upgrade your modsecurity-crs packages.

For the detailed security status of modsecurity-crs please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/modsecurity-crs

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



ELA-1651-1 modsecurity-crs security update


Package : modsecurity-crs
Version : 3.2.3-0+deb10u4 (buster)

Related CVEs :
CVE-2023-38199

A issue has been fixed in modsecurity-crs, a set of generic attack detection rules for use with ModSecurity.
CVE-2023-38199
Coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not detect multiple Content-Type request headers on some platforms. This might allow attackers to bypass a WAF with a crafted payload, aka “Content-Type confusion” between the WAF and the backend application. This occurs when the web application relies on only the last Content-Type header. Other platforms may reject the additional Content-Type header or merge conflicting headers, leading to detection as a malformed header.


ELA-1651-1 modsecurity-crs security update



[SECURITY] [DLA 4489-1] libvpx security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4489-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Thorsten Alteholz
February 22, 2026 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : libvpx
Version : 1.9.0-1+deb11u5
CVE ID : CVE-2026-2447

A buffer overflow was discovered in libvpx, a library implementing the
VP8/VP9 open video codecs, which could result in denial of service or
potentially the execution of arbitrary code.

For Debian 11 bullseye, this problem has been fixed in version
1.9.0-1+deb11u5.

We recommend that you upgrade your libvpx packages.

For the detailed security status of libvpx please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libvpx

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS