Hi Yaroslav,
If you consider this problem a security hole, it can be fixed through a
point update. Take a look to:
http://www.debian.org/doc/manuals/developers-reference/pkgs.html#upload-stable
Regards,
/luciano
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with
Processing commands for cont...@bugs.debian.org:
> tags 650678 + squeeze
Bug #650678 [fail2ban] fail2ban: Random iptables errors on start
Added tag(s) squeeze.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
650678: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug
tags 650678 + squeeze
thanks
this is a duplicate of #554162, which was fixed in 0.8.5-2. I will keep
this one open and tag it against squeeze and will suggest a
security update (although as I have argued in the original report it is
not really a security hole, rather lack of additional promised s
Package: fail2ban
Version: 0.8.4-3
Severity: grave
Tags: security
Justification: user security hole
I have used fail2ban but this is very strange. According to fail2ban log
and the output of iptables some of the iptables commands in the
iptables-multiport action script fail. I can't see any sytem
4 matches
Mail list logo