drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in Fail2ban
Name: |
Denial of Service in Fail2ban |
|
ID: |
FEDORA-2013-10806 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 18 |
|
Datum: |
Fr, 28. Juni 2013, 10:52 |
|
Referenzen: |
Keine Angabe |
|
Applikationen: |
Fail2ban |
|
Originalnachricht |
Name : fail2ban Product : Fedora 18 Version : 0.8.10 Release : 1.fc18 URL : http://fail2ban.sourceforge.net/ Summary : Ban IPs that make too many password failures Description : Fail2ban scans log files like /var/log/pwdfail or /var/log/apache/error_log and bans IP that makes too many password failures. It updates firewall rules to reject the IP address.
To use the hostsdeny and shorewall actions you must install tcp_wrappers and shorewall respectively.
------------------------------------------------------------------------------- - Update Information:
Fail2Ban 0.8.10 addresses a possible remote denial of service attack when using the supplied apache- filters. ------------------------------------------------------------------------------- - ChangeLog:
* Wed Jun 12 2013 Orion Poplawski <orion@cora.nwra.com> - 0.8.10-1 - Update to 0.8.10 security release - Use upstream provided systemd files - Drop upstreamed patches, rebase log2syslog and notmp patches * Fri Mar 15 2013 Orion Poplawski <orion@cora.nwra.com> - 0.8.8-4 - Use systemd init for Fedora 19+ (bug #883158) * Thu Feb 14 2013 Orion Poplawski <orion@cora.nwra.com> - 0.8.8-3 - Add patch from upstream to fix module imports (Bug #892365) - Add patch from upstream to UTF-8 characters in syslog (Bug #905097) - Drop Requires: tcp_wrappers and shorewall (Bug #781341) * Fri Jan 18 2013 Orion Poplawski <orion@cora.nwra.com> - 0.8.8-2 - Add patch to prevent sshd blocks of successful logins for systems that use sssd or ldap * Mon Dec 17 2012 Orion Poplawski <orion@cora.nwra.com> - 0.8.8-1 - Update to 0.8.8 (CVE-2012-5642 Bug #887914) * Thu Oct 11 2012 Orion Poplawski <orion@cora.nwra.com> - 0.8.7.1-1 - Update to 0.8.7.1 - Drop fd_cloexec, pyinotify, and examplemail patches fixed upstream - Rebase sshd and notmp patches - Use _initddir macro ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #973756 - CVE-2013-2178 fail2ban: remote denial of service due to apache log parsing issue https://bugzilla.redhat.com/show_bug.cgi?id=973756 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update fail2ban' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|