1
Candidate: CVE-2012-5642
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5642
5
http://www.openwall.com/lists/oss-security/2012/12/17/1
7
server/action.py in Fail2ban before 0.8.8 does not properly handle the
8
content of the matches tag, which might allow remote attackers to trigger
9
unsafe behavior in a custom action file via unspecified symbols in this
14
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696184
20
upstream: https://github.com/fail2ban/fail2ban/commit/83109bc
21
upstream_fail2ban: released (0.8.8)
22
hardy_fail2ban: ignored (reached end-of-life)
23
lucid_fail2ban: ignored (reached end-of-life)
24
oneiric_fail2ban: ignored (reached end-of-life)
25
precise_fail2ban: released (0.8.6-3wheezy2build0.12.04.1)
26
quantal_fail2ban: ignored (reached end-of-life)
27
raring_fail2ban: ignored (reached end-of-life)
28
saucy_fail2ban: not-affected (0.8.10-1)
29
trusty_fail2ban: not-affected (0.8.10-1)
30
devel_fail2ban: not-affected (0.8.10-1)