Hi Yaroslav,

> I am emailing you since you are among the ones who raised the concern
> about issues in fail2ban 0.7.5-2 which is currently in etch.

I've taken a look as a member of the security team. Given your changelog:

  * NOT RELEASED YET
  * Propagated fix for asctime pattern from 0.7.8 release (closes: #421848)

I do not see the security implications of this bug.

  * Propagated fix for not closed log files from 0.7.8-1
    (closes: #439962,434368)

Surely a critical bug, but does it have security implications?

  * Propagated fix for "reload" bug which is as sever as #439962 and just
    never was hit by any Debian user yet

It's unclear to me what issue this is exactly.

  * Added patch 00_numeric_iptables-L to avoid possible DoS attacks
    (introduced upstream in 0.7.6)

This sounds security-related.

  * Propagated "Fixed removal of host in hosts.deny" from 0.7.6, to prevent
    possible DoS

Also security-related.

  * Rigid call to python2.4 instead of via /usr/bin/env to prevent
    in-the-middle attack via environment poisoning

Is this theoretical or is it a realistic scenario? Can you give an example?

  * Anchored sshd and vsftpd failregex at the end of line to prevent DoS on
    those services, which is related to CVE-2007-4321 and closed in sid
    438187.

This is also a security issue.

So concluding, this update seems to mix security and non-security issues, and 
that is not acceptable to us. For an update through security.debian.org you 
need to make a version that only includes real security fixes.

Other critical fixes can be sent for review to the stable release managers at 
[EMAIL PROTECTED]


thanks,
Thijs

Attachment: pgpLup53iA9Hw.pgp
Description: PGP signature

Reply via email to