Debian: DSA-2979-1: fail2ban security update
Debian: DSA-2979-1: fail2ban security update
Two vulnerabilities were discovered in Fail2ban, a solution to ban hosts that cause multiple authentication errors. When using Fail2ban to monitor Postfix or Cyrus IMAP logs, improper input validation in log parsing could enable a remote attacker to trigger an IP ban on arbitrary
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2979-1 This email address is being protected from spambots. You need JavaScript enabled to view it. https://www.debian.org/security/ Moritz Muehlenhoff July 17, 2014 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : fail2ban CVE ID : CVE-2013-7176 CVE-2013-7177 Two vulnerabilities were discovered in Fail2ban, a solution to ban hosts that cause multiple authentication errors. When using Fail2ban to monitor Postfix or Cyrus IMAP logs, improper input validation in log parsing could enable a remote attacker to trigger an IP ban on arbitrary addresses, resulting in denial of service. For the stable distribution (wheezy), these problems have been fixed in version 0.8.6-3wheezy3. For the testing distribution (jessie), these problems have been fixed in version 0.8.11-1. For the unstable distribution (sid), these problems have been fixed in version 0.8.11-1. We recommend that you upgrade your fail2ban packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.