Sicherheit: Ausführen beliebiger Kommandos in Fail2ban
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in Fail2ban
ID: FEDORA-2012-20589
Distribution: Fedora
Plattformen: Fedora 18
Datum: Sa, 12. Januar 2013, 22:54
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5642
Applikationen: Fail2ban


Name        : fail2ban
Product : Fedora 18
Version : 0.8.8
Release : 1.fc18
URL : http://fail2ban.sourceforge.net/
Summary : Ban IPs that make too many password failures
Description :
Fail2ban scans log files like /var/log/pwdfail or
/var/log/apache/error_log and bans IP that makes too many password
failures. It updates firewall rules to reject the IP address.

Update Information:

Update to 0.8.8 (CVE-2012-5642 Bug #887914)
- Fixes:
* Alan Jenkins
* [8c38907] Removed 'POSSIBLE BREAK-IN ATTEMPT' from sshd filter to
banning due to misconfigured DNS. Close gh-64
* Yaroslav Halchenko
* [83109bc] IMPORTANT: escape the content of <matches> (if used in
custom action files) since its value could contain arbitrary
symbols. Thanks for discovery go to the NBS System security
* [b159eab] do not enable pyinotify backend if pyinotify < 0.8.3
* [37a2e59] store IP as a base, non-unicode str to avoid spurious messages
in the console. Close gh-91
- New features:
* David Engeset
* [2d672d1,6288ec2] 'unbanip' command for the client + avoidance of
the log file to take 'banip' or 'unbanip' in effect. Close
gh-81, gh-86
* Yaroslav Halchenko
- Enhancements:
* [2d66f31] replaced uninformative "Invalid command" message with
warning log
exception why command actually failed
* [958a1b0] improved failregex to "support" auth.backend =
* [9e7a3b7] until we make it proper module -- adjusted sys.path only if
system-wide run
* [f52ba99] downgraded "already banned" from WARN to INFO level.
Closes gh-79
* [f105379] added hints into the log on some failure return codes (e.g.
for this gh-87)
* Various others: travis-ci integration, script to run tests
against all available Python versions, etc

* Mon Dec 17 2012 Orion Poplawski <orion@cora.nwra.com> - 0.8.8-1
- Update to 0.8.8 (CVE-2012-5642 Bug #887914)
* Thu Oct 11 2012 Orion Poplawski <orion@cora.nwra.com> -
- Update to
- Drop fd_cloexec, pyinotify, and examplemail patches fixed upstream
- Rebase sshd and notmp patches
- Use _initddir macro

[ 1 ] Bug #887914 - CVE-2012-5642 fail2ban: does not escape the content of

This update can be installed with the "yum" update program. Use
su -c 'yum update fail2ban' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Pro-Linux @Facebook
Neue Nachrichten