lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20130616121917.GA10898@scapa.corsac.net> Date: Sun, 16 Jun 2013 14:19:20 +0200 From: Yves-Alexis Perez <corsac@...ian.org> To: debian-security-announce@...ts.debian.org Subject: [SECURITY] [DSA 2708-1] fail2ban security update -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2708-1 security@...ian.org http://www.debian.org/security/ Yves-Alexis Perez June 16, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : fail2ban Vulnerability : denial of service Problem type : remote Debian-specific: no CVE ID : CVE-2013-2178 Krzysztof Katowicz-Kowalewski discovered a vulnerability in fail2ban, a log monitoring and system which can act on attack by preventing hosts to connect to specified services using the local firewall. When using fail2ban to monitor Apache logs, improper input validation in log parsing could enable a remote attacker to trigger an IP ban on arbitrary addresses, thus causing a denial of service. For the oldstable distribution (squeeze), this problem has been fixed in version 0.8.4-3+squeeze2. For the stable distribution (wheezy), this problem has been fixed in version 0.8.6-3wheezy2. For the testing distribution (jessie), this problem has been fixed in version 0.8.10-1. For the unstable distribution (sid), this problem has been fixed in version 0.8.10-1. We recommend that you upgrade your fail2ban packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@...ts.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.20 (GNU/Linux) iQEcBAEBCgAGBQJRva1AAAoJEG3bU/KmdcClMRYH/2agggbyiE5xMEp4VwOId+b2 1nVT+m/67scAkz+SSwpyKIrj864df/n2jMMHLeD6CNd1irWLijy3Re0BapkdmsXg JFjydMFl9AjfE0P2xhRtZ/ubl7T+lV/TlfLuSma2qMygbTnieqZLENv1KXCesbmY mu79kfuqAnz9fWaMNVZ1AD4EvTZZzS1nNKGu5TsBxrdHzBCNZ82sNvRvoLrwFmOc 4rf3iTP3tmvWJNTyMnUk4YCCW/33+WAp7T+ONOsPjIBFKX3aoVHbWRCLu+zQlgs5 HN9P34CJa12yaq+Q/dxAzORqLWqTr7POte+gvxDF8TchziabKamPv5bzceJTFp8= =mSKU -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists