It was found that fail2ban IPs banner used insecure default temporary file
when unbanning an IP address. A local attacker could use this flaw to conduct
symlink attacks in order to gain access to sensitive information or potentially
to overwrite arbitrary file on the system.
Patch applied by Debian distribution:
This issue affects the versions of the fail2ban package, as present
within EPEL-4, EPEL-5 and EPEL-6 repositories.
This issue affects the versions of the fail2ban package, as shipped
with Fedora release of 13 and 14.
Please schedule an update.
Created fail2ban tracking bugs for this issue
Affects: epel-4 [bug 700765]
Affects: epel-5 [bug 700767]
Affects: epel-6 [bug 700768]
Affects: fedora-all [bug 700769]
(In reply to comment #1)
> This issue affects the versions of the fail2ban package, as shipped
> with Fedora release of 13 and 14.
This seems to be fixed in Fedora already - see fail2ban-0.8.4-notmp.patch:
(In reply to comment #0)
> Patch applied by Debian distribution:
Which seems to be a git-svn clone of the upstream SVN commit:
*** This bug has been marked as a duplicate of bug 669965 ***
Please don't close SRT bugs. It does not look like fail2ban in EPEL has been fixed yet, so this bug shouldn't be closed.
This has also been assigned the name CVE-2009-5023.
*** Bug 718836 has been marked as a duplicate of this bug. ***