Date: Wed, 20 Oct 2021 09:53:08 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 259297] security/py-fail2ban: Add upstream patch to fix possible RCE vulnerability Message-ID: <bug-259297-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D259297 Bug ID: 259297 Summary: security/py-fail2ban: Add upstream patch to fix possible RCE vulnerability Product: Ports & Packages Version: Latest Hardware: Any URL: https://github.com/fail2ban/fail2ban/security/advisori es/GHSA-m985-3f3v-cwmm OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: yasu@freebsd.org CC: theis@gmx.at CC: theis@gmx.at Flags: maintainer-feedback?(theis@gmx.at) Created attachment 228865 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D228865&action= =3Dedit Patch file * Add upstream patch to fix possible RCE vulnerability * Switch to DISTVERSION * Pet portclippy * Reformat Makefile with portfmt Obtained from: https://github.com/fail2ban/fail2ban/commit/410a6ce5c80dd981c22752da034f252= 9b5eee844 Security: CVE-2021-32749 Security: https://github.com/fail2ban/fail2ban/security/advisories/GHSA-m985-3f3v-cwmm --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-259297-7788>