The release notes for fail2ban 0.8.8 [1],[2] indicate: * [83109bc] IMPORTANT: escape the content of <matches> (if used in custom action files) since its value could contain arbitrary symbols. Thanks for discovery go to the NBS System security team This could cause issues on the system running fail2ban as it scans log files, depending on what content is matched. There isn't much more detail about this issue than what is described above, so I think it may largely depend on the type of regexp used (what it matches) and the contents of the log file being scanned (whether or not an attacher could insert something that could be used in a malicious way). The upstream git commit [3]. [1] https://raw.github.com/fail2ban/fail2ban/master/ChangeLog [2] http://sourceforge.net/mailarchive/message.php?msg_id=30193056 [3] https://github.com/fail2ban/fail2ban/commit/83109bc
Created fail2ban tracking bugs for this issue Affects: fedora-all [bug 887915] Affects: epel-all [bug 887916]
This was assigned CVE-2012-5642: http://www.openwall.com/lists/oss-security/2012/12/17/2
fail2ban-0.8.8-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
fail2ban-0.8.8-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
fail2ban-0.8.8-1.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.