View | Details | Raw Unified | Return to bug 223022
Collapse All | Expand All

(-)Makefile (-1 / +1 lines)
Lines 1-7 Link Here
1
# $FreeBSD$
1
# $FreeBSD$
2
2
3
PORTNAME=	fail2ban
3
PORTNAME=	fail2ban
4
PORTVERSION=	0.10.0
4
PORTVERSION=	0.10.1
5
CATEGORIES=	security python
5
CATEGORIES=	security python
6
PKGNAMEPREFIX=	${PYTHON_PKGNAMEPREFIX}
6
PKGNAMEPREFIX=	${PYTHON_PKGNAMEPREFIX}
7
7
(-)distinfo (-3 / +3 lines)
Lines 1-3 Link Here
1
TIMESTAMP = 1502542383
1
TIMESTAMP = 1507898553
2
SHA256 (fail2ban-fail2ban-0.10.0_GH0.tar.gz) = 3517b68bff71924f179609eb51dd2fe66d78653646528cdf8edf2370ff047c80
2
SHA256 (fail2ban-fail2ban-0.10.1_GH0.tar.gz) = 19bac652e50f35b3b58ea010c2b89b91b945365d37dbf17467e0dc345c058465
3
SIZE (fail2ban-fail2ban-0.10.0_GH0.tar.gz) = 459813
3
SIZE (fail2ban-fail2ban-0.10.1_GH0.tar.gz) = 465156
(-)files/patch-fail2ban_server_ipdns.py (-19 lines)
Lines 1-19 Link Here
1
--- fail2ban/server/ipdns.py.orig	2017-08-09 14:53:05 UTC
2
+++ fail2ban/server/ipdns.py
3
@@ -69,10 +69,14 @@ class DNSUtils:
4
 		for fam, ipfam in ((socket.AF_INET, IPAddr.FAM_IPv4), (socket.AF_INET6, IPAddr.FAM_IPv6)):
5
 			try:
6
 				for result in socket.getaddrinfo(dns, None, fam, 0, socket.IPPROTO_TCP):
7
-					ip = IPAddr(result[4][0], ipfam)
8
+					# if getaddrinfo returns something unexpected:
9
+					if len(result) < 4 or not len(result[4]): continue
10
+					# be sure we have an ip-string
11
+					# some return an integer there
12
+					ip = IPAddr(str(result[4][0]), ipfam)
13
 					if ip.isValid:
14
 						ips.append(ip)
15
-			except socket.error as e:
16
+			except Exception as e:
17
 				saveerr = e
18
 		if not ips and saveerr:
19
 			logSys.warning("Unable to find a corresponding IP address for %s: %s", dns, saveerr)

Return to bug 223022