MGASA-2014-0176

Source
https://advisories.mageia.org/MGASA-2014-0176.html
Import Source
https://advisories.mageia.org/MGASA-2014-0176.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0176
Related
Published
2014-04-16T13:12:59Z
Modified
2014-04-16T13:12:49Z
Summary
Updated fail2ban packages fix security issues
Details

An update to fail2ban 0.8.13 has been released to fix security issues, amongst other bugfixes.

fail2ban versions prior to 0.8.11 would allow a remote unauthenticated attacker to cause arbitrary IP addresses to be blocked by Fail2ban causing legitimate users to be blocked from accessing services protected by Fail2ban. These services are cyrus-imap (CVE-2013-7177) and postfix (CVE-2013-7176).

References
Credits

Affected packages

Mageia:3 / fail2ban

Package

Name
fail2ban
Purl
pkg:rpm/mageia/fail2ban?arch=source&distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.13-2.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / fail2ban

Package

Name
fail2ban
Purl
pkg:rpm/mageia/fail2ban?arch=source&distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.13-2.mga4

Ecosystem specific

{
    "section": "core"
}