Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 447572 (CVE-2012-5642) - <net-analyzer/fail2ban-0.8.8: input variable quoting vulnerability (CVE-2012-5642)
Summary: <net-analyzer/fail2ban-0.8.8: input variable quoting vulnerability (CVE-2012-...
Status: RESOLVED FIXED
Alias: CVE-2012-5642
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://raw.github.com/fail2ban/fail2...
Whiteboard: B4 [noglsa]
Keywords:
Depends on: 449966
Blocks:
  Show dependency tree
 
Reported: 2012-12-17 10:25 UTC by Mario Kicherer
Modified: 2013-02-22 20:44 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Mario Kicherer 2012-12-17 10:25:40 UTC
Version 0.8.8 came out 2012/12/06. I tested it with the fail2ban-0.8.7.1 ebuild and it works for me on AMD64.

Reproducible: Always
Comment 1 Jeroen Roovers (RETIRED) gentoo-dev 2012-12-17 12:20:49 UTC
   * [83109bc] IMPORTANT: escape the content of <matches> (if used in
     custom action files) since its value could contain arbitrary
     symbols.  Thanks for discovery go to the NBS System security
     team
Comment 2 Sean Amoss (RETIRED) gentoo-dev Security 2012-12-26 16:47:29 UTC
Thanks, Mario and Jeroen.

Arches, please test and mark stable
=net-analyzer/fail2ban-0.8.8
Comment 3 Jeff (JD) Horelick (RETIRED) gentoo-dev 2012-12-26 17:00:44 UTC
x86 stable
Comment 4 Agostino Sarubbo gentoo-dev 2012-12-26 17:19:13 UTC
amd64 stable
Comment 5 Jeroen Roovers (RETIRED) gentoo-dev 2012-12-28 16:53:54 UTC
Stable for HPPA.
Comment 6 Agostino Sarubbo gentoo-dev 2012-12-31 23:30:54 UTC
ppc stable
Comment 7 GLSAMaker/CVETool Bot gentoo-dev 2013-01-03 11:42:44 UTC
CVE-2012-5642 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5642):
  server/action.py in Fail2ban before 0.8.8 does not properly handle the
  content of the matches tag, which might allow remote attackers to trigger
  unsafe behavior in a custom action file via unspecified symbols in this
  content.
Comment 8 Agostino Sarubbo gentoo-dev 2013-01-04 13:15:35 UTC
ppc64 stable
Comment 9 Sean Amoss (RETIRED) gentoo-dev Security 2013-01-06 17:21:01 UTC
GLSA vote: no.
Comment 10 Mario Kicherer 2013-02-22 20:37:09 UTC
Can we close this bug? I guess GLSA is not required anymore. :)
Comment 11 Tobias Heinlein (RETIRED) gentoo-dev 2013-02-22 20:44:04 UTC
NO too, closing.