Accepted fail2ban 0.7.5-2etch1 (source all)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Tue, 01 May 2007 22:18:03 -0400
Source: fail2ban
Binary: fail2ban
Architecture: source all
Version: 0.7.5-2etch1
Distribution: stable-security
Urgency: high
Maintainer: Yaroslav Halchenko <debian@onerussian.com>
Changed-By: Yaroslav Halchenko <debian@onerussian.com>
Description:
fail2ban - bans IPs that cause multiple authentication errors
Closes: 421848 434368 439962
Changes:
fail2ban (0.7.5-2etch1) stable-security; urgency=high
.
* Propagated fix for asctime pattern from 0.7.8 release (closes: #421848)
* Propagated fix for not closed log files from 0.7.8-1
(closes: #439962,434368)
* Propagated fix for "reload" bug which is as sever as #439962 and just
never was hit by any Debian user yet
* Added patch 00_numeric_iptables-L to avoid possible DoS attacks
(introduced upstream in 0.7.6)
* Propagated "Fixed removal of host in hosts.deny" from 0.7.6, to prevent
possible DoS
* CVE-2007-4321: anchored sshd and vsftpd failregex at the end of line
to prevent DoS on those services. This issue was resolved in sid's version
0.8.0-4 (bugreport 438187).
Files:
67efd3e859d89b4b2d2e527ff09ac659 704 net optional fail2ban_0.7.5-2etch1.dsc
36e65b8effcfd4f4a437d214613eb916 46075 net optional fail2ban_0.7.5.orig.tar.gz
c1f185e48d340020de0651962fc34402 21899 net optional fail2ban_0.7.5-2etch1.diff.gz
afb61355977afe99b2a807a6de03685f 63564 net optional fail2ban_0.7.5-2etch1_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHglRIjRFFY3XAJMgRAjewAKDWRMBLl0/ja2YmpKQ2/ySj0C9U2wCeJc6S
3NaT2m+1ROBy6Dmc+kY7Ues=
=x0q5
-----END PGP SIGNATURE-----
Accepted:
fail2ban_0.7.5-2etch1.diff.gz
to pool/main/f/fail2ban/fail2ban_0.7.5-2etch1.diff.gz
fail2ban_0.7.5-2etch1.dsc
to pool/main/f/fail2ban/fail2ban_0.7.5-2etch1.dsc
fail2ban_0.7.5-2etch1_all.deb
to pool/main/f/fail2ban/fail2ban_0.7.5-2etch1_all.deb
Reply to: