Control: forwarded -1 https://github.com/fail2ban/fail2ban/issues/3059 
https://savannah.gnu.org/bugs/?60937 
https://git.savannah.gnu.org/cgit/mailutils.git/commit/?id=4befcfd015256c568121653038accbd84820198f

On Fri, 23 Jul 2021 19:44:08 +0000 (UTC) Thorsten Alteholz wrote:

> According to upstreams security advisory [1] CVE-2021-32749 only affects 
> systems where the mail utility from the mailutils package is installed.
> The recommended fix [2] is to add a new parameter "-E" to the invocation 
> of mail. Unfortunately this fix breaks other implementations of mail,
> especially the version from package bsd-mailx. Thus upstream recommends in 
> the Workaround section of the advisory to only manually patch the
> systems where the mailutils-mail is used.
> 
> According to popcon the numbers of systems where mailutils-mail and 
> bsd-mailx-mail are used is about even. So applying upstreams fix now 
> breaks about half of the systems using fail2ban.
> 
> The corresponding upstream bug #3069 [3] did not get any attention yet.

The bug got forwarded to mailutils upstream and fixed there by
disabling the escape sequence in non-interactive situations.

The next step is for fail2ban to revert the workaround for the
appropriate versions of mail, I've suggested how that they should do
that on the upstream bug #3059.

-- 
bye,
pabs

https://wiki.debian.org/PaulWise

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to