-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Tue, 01 May 2007 22:18:03 -0400 Source: fail2ban Binary: fail2ban Architecture: source all Version: 0.7.5-2etch1 Distribution: stable-security Urgency: high Maintainer: Yaroslav Halchenko <debian@onerussian.com> Changed-By: Yaroslav Halchenko <debian@onerussian.com> Description: fail2ban - bans IPs that cause multiple authentication errors Closes: 421848 434368 439962 Changes: fail2ban (0.7.5-2etch1) stable-security; urgency=high . * Propagated fix for asctime pattern from 0.7.8 release (closes: #421848) * Propagated fix for not closed log files from 0.7.8-1 (closes: #439962,434368) * Propagated fix for "reload" bug which is as sever as #439962 and just never was hit by any Debian user yet * Added patch 00_numeric_iptables-L to avoid possible DoS attacks (introduced upstream in 0.7.6) * Propagated "Fixed removal of host in hosts.deny" from 0.7.6, to prevent possible DoS * CVE-2007-4321: anchored sshd and vsftpd failregex at the end of line to prevent DoS on those services. This issue was resolved in sid's version 0.8.0-4 (bugreport 438187). Files: 67efd3e859d89b4b2d2e527ff09ac659 704 net optional fail2ban_0.7.5-2etch1.dsc 36e65b8effcfd4f4a437d214613eb916 46075 net optional fail2ban_0.7.5.orig.tar.gz c1f185e48d340020de0651962fc34402 21899 net optional fail2ban_0.7.5-2etch1.diff.gz afb61355977afe99b2a807a6de03685f 63564 net optional fail2ban_0.7.5-2etch1_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHglRIjRFFY3XAJMgRAjewAKDWRMBLl0/ja2YmpKQ2/ySj0C9U2wCeJc6S 3NaT2m+1ROBy6Dmc+kY7Ues= =x0q5 -----END PGP SIGNATURE----- Accepted: fail2ban_0.7.5-2etch1.diff.gz to pool/main/f/fail2ban/fail2ban_0.7.5-2etch1.diff.gz fail2ban_0.7.5-2etch1.dsc to pool/main/f/fail2ban/fail2ban_0.7.5-2etch1.dsc fail2ban_0.7.5-2etch1_all.deb to pool/main/f/fail2ban/fail2ban_0.7.5-2etch1_all.deb