rpms/mod_security/devel .cvsignore, 1.7, 1.8 mod_security.conf, 1.6, 1.7 mod_security.spec, 1.18, 1.19 sources, 1.9, 1.10

Michael G. Fleming (mfleming) fedora-extras-commits at redhat.com
Tue Jun 19 10:26:30 UTC 2007


Author: mfleming

Update of /cvs/extras/rpms/mod_security/devel
In directory cvs-int.fedora.redhat.com:/tmp/cvs-serv11368

Modified Files:
	.cvsignore mod_security.conf mod_security.spec sources 
Log Message:
Newer upstream release


Index: .cvsignore
===================================================================
RCS file: /cvs/extras/rpms/mod_security/devel/.cvsignore,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -r1.7 -r1.8
--- .cvsignore	13 Mar 2007 09:20:35 -0000	1.7
+++ .cvsignore	19 Jun 2007 10:25:54 -0000	1.8
@@ -1,3 +1,3 @@
+modsecurity-apache_2.1.1.tar.gz
 mod_security.conf
-modsecurity-apache_2.1.0.tar.gz
 modsecurity_localrules.conf


Index: mod_security.conf
===================================================================
RCS file: /cvs/extras/rpms/mod_security/devel/mod_security.conf,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- mod_security.conf	1 Apr 2007 09:57:48 -0000	1.6
+++ mod_security.conf	19 Jun 2007 10:25:54 -0000	1.7
@@ -12,11 +12,9 @@
 	Include modsecurity.d/modsecurity_crs_10_config.conf
 	
 	# Protocol violation and anomalies.
-	# These are disabled as there's a bug in REQUEST_FILENAME handling
-	# causing the "+" character to be incorrectly handled.
 	
-	# Include modsecurity.d/modsecurity_crs_20_protocol_violations.conf
-	# Include modsecurity.d/modsecurity_crs_21_protocol_anomalies.conf
+	Include modsecurity.d/modsecurity_crs_20_protocol_violations.conf
+	Include modsecurity.d/modsecurity_crs_21_protocol_anomalies.conf
 	
 	# HTTP policy rules
 	
@@ -35,7 +33,6 @@
 	# Include modsecurity.d/modsecurity_crs_55_marketing.conf
 	
 	# Put your local rules in here.
-	# The existing example is for the CVE-2007-1359 vulnerability
 
 	Include modsecurity.d/modsecurity_localrules.conf
 </IfModule>


Index: mod_security.spec
===================================================================
RCS file: /cvs/extras/rpms/mod_security/devel/mod_security.spec,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -r1.18 -r1.19
--- mod_security.spec	1 Apr 2007 09:57:48 -0000	1.18
+++ mod_security.spec	19 Jun 2007 10:25:54 -0000	1.19
@@ -1,7 +1,7 @@
 Summary: Security module for the Apache HTTP Server
 Name: mod_security 
-Version: 2.1.0
-Release: 3%{?dist}
+Version: 2.1.1
+Release: 1%{?dist}
 License: GPL
 URL: http://www.modsecurity.org/
 Group: System Environment/Daemons
@@ -41,14 +41,20 @@
 %defattr (-,root,root)
 %doc CHANGES LICENSE README.* modsecurity* doc
 %{_libdir}/httpd/modules/mod_security2.so
-%config %{_sysconfdir}/httpd/conf.d/mod_security.conf
+%config(noreplace) %{_sysconfdir}/httpd/conf.d/mod_security.conf
 %dir %{_sysconfdir}/httpd/modsecurity.d
 %dir %{_sysconfdir}/httpd/modsecurity.d/blocking
-%config %{_sysconfdir}/httpd/modsecurity.d/*.conf
-%config %{_sysconfdir}/httpd/modsecurity.d/blocking/*.conf
+%config(noreplace) %{_sysconfdir}/httpd/modsecurity.d/*.conf
+%config(noreplace) %{_sysconfdir}/httpd/modsecurity.d/blocking/*.conf
 
 
 %changelog
+* Tue Jun 19 2007 Michael Fleming <mfleming+rpm at enlartenment.com> 2.1.1-1
+- New upstream release
+- Drop ASCIIZ rule (fixed upstream)
+- Re-enable protocol violation/anomalies rules now that REQUEST_FILENAME
+  is fixed upstream.
+
 * Sun Apr 1 2007 Michael Fleming <mfleming+rpm at enlartenment.com> 2.1.0-3
 - Automagically configure correct library path for libxml2 library.
 - Add LoadModule for mod_unique_id as the logging wants this at runtime


Index: sources
===================================================================
RCS file: /cvs/extras/rpms/mod_security/devel/sources,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -r1.9 -r1.10
--- sources	1 Apr 2007 09:57:48 -0000	1.9
+++ sources	19 Jun 2007 10:25:54 -0000	1.10
@@ -1,3 +1,3 @@
-2e919766f2878c4ee46334816004dd15  modsecurity-apache_2.1.0.tar.gz
-cbd1dbca89666a85fe9d703de26444c6  modsecurity_localrules.conf
-ca0529cce7b56675e5f319c75cbb7398  mod_security.conf
+ab74ed5f320ffc4ed9f56487bf17c670  modsecurity-apache_2.1.1.tar.gz
+f84917a3f4893b8bf9400755a1a9f883  mod_security.conf
+80dc93f186cab170828d0ac621baac30  modsecurity_localrules.conf




More information about the scm-commits mailing list