Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in Fail2ban
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in Fail2ban
ID: FEDORA-2012-20619
Distribution: Fedora
Plattformen: Fedora 17
Datum: Fr, 28. Dezember 2012, 09:03
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5642
Applikationen: Fail2ban

Originalnachricht

Name        : fail2ban
Product : Fedora 17
Version : 0.8.8
Release : 1.fc17
URL : http://fail2ban.sourceforge.net/
Summary : Ban IPs that make too many password failures
Description :
Fail2ban scans log files like /var/log/pwdfail or
/var/log/apache/error_log and bans IP that makes too many password
failures. It updates firewall rules to reject the IP address.

-------------------------------------------------------------------------------
-
Update Information:

Update to 0.8.8 (CVE-2012-5642 Bug #887914)
- Fixes:
* Alan Jenkins
* [8c38907] Removed 'POSSIBLE BREAK-IN ATTEMPT' from sshd filter to
avoid
banning due to misconfigured DNS. Close gh-64
* Yaroslav Halchenko
* [83109bc] IMPORTANT: escape the content of <matches> (if used in
custom action files) since its value could contain arbitrary
symbols. Thanks for discovery go to the NBS System security
team
* [b159eab] do not enable pyinotify backend if pyinotify < 0.8.3
* [37a2e59] store IP as a base, non-unicode str to avoid spurious messages
in the console. Close gh-91
- New features:
* David Engeset
* [2d672d1,6288ec2] 'unbanip' command for the client + avoidance of
touching
the log file to take 'banip' or 'unbanip' in effect. Close
gh-81, gh-86
* Yaroslav Halchenko
- Enhancements:
* [2d66f31] replaced uninformative "Invalid command" message with
warning log
exception why command actually failed
* [958a1b0] improved failregex to "support" auth.backend =
"htdigest"
* [9e7a3b7] until we make it proper module -- adjusted sys.path only if
system-wide run
* [f52ba99] downgraded "already banned" from WARN to INFO level.
Closes gh-79
* [f105379] added hints into the log on some failure return codes (e.g.
0x7f00
for this gh-87)
* Various others: travis-ci integration, script to run tests
against all available Python versions, etc
-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Dec 17 2012 Orion Poplawski <orion@cora.nwra.com> - 0.8.8-1
- Update to 0.8.8 (CVE-2012-5642 Bug #887914)
* Thu Oct 11 2012 Orion Poplawski <orion@cora.nwra.com> - 0.8.7.1-1
- Update to 0.8.7.1
- Drop fd_cloexec, pyinotify, and examplemail patches fixed upstream
- Rebase sshd and notmp patches
- Use _initddir macro
* Thu Jul 19 2012 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 0.8.4-29
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #887914 - CVE-2012-5642 fail2ban: does not escape the content of
<matches>
https://bugzilla.redhat.com/show_bug.cgi?id=887914
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update fail2ban' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung