Login
Newsletter
Werbung

Sicherheit: Denial of Service in Fail2ban
Aktuelle Meldungen Distributionen
Name: Denial of Service in Fail2ban
ID: FEDORA-2013-10806
Distribution: Fedora
Plattformen: Fedora 18
Datum: Fr, 28. Juni 2013, 10:52
Referenzen: Keine Angabe
Applikationen: Fail2ban

Originalnachricht

Name        : fail2ban
Product : Fedora 18
Version : 0.8.10
Release : 1.fc18
URL : http://fail2ban.sourceforge.net/
Summary : Ban IPs that make too many password failures
Description :
Fail2ban scans log files like /var/log/pwdfail or
/var/log/apache/error_log and bans IP that makes too many password
failures. It updates firewall rules to reject the IP address.

To use the hostsdeny and shorewall actions you must install tcp_wrappers
and shorewall respectively.

-------------------------------------------------------------------------------
-
Update Information:

Fail2Ban 0.8.10 addresses a possible remote denial of service attack when using
the supplied apache- filters.
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Jun 12 2013 Orion Poplawski <orion@cora.nwra.com> - 0.8.10-1
- Update to 0.8.10 security release
- Use upstream provided systemd files
- Drop upstreamed patches, rebase log2syslog and notmp patches
* Fri Mar 15 2013 Orion Poplawski <orion@cora.nwra.com> - 0.8.8-4
- Use systemd init for Fedora 19+ (bug #883158)
* Thu Feb 14 2013 Orion Poplawski <orion@cora.nwra.com> - 0.8.8-3
- Add patch from upstream to fix module imports (Bug #892365)
- Add patch from upstream to UTF-8 characters in syslog (Bug #905097)
- Drop Requires: tcp_wrappers and shorewall (Bug #781341)
* Fri Jan 18 2013 Orion Poplawski <orion@cora.nwra.com> - 0.8.8-2
- Add patch to prevent sshd blocks of successful logins for systems that use
sssd or ldap
* Mon Dec 17 2012 Orion Poplawski <orion@cora.nwra.com> - 0.8.8-1
- Update to 0.8.8 (CVE-2012-5642 Bug #887914)
* Thu Oct 11 2012 Orion Poplawski <orion@cora.nwra.com> - 0.8.7.1-1
- Update to 0.8.7.1
- Drop fd_cloexec, pyinotify, and examplemail patches fixed upstream
- Rebase sshd and notmp patches
- Use _initddir macro
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #973756 - CVE-2013-2178 fail2ban: remote denial of service due to
apache log parsing issue
https://bugzilla.redhat.com/show_bug.cgi?id=973756
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update fail2ban' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung