-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3431-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff January 01, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : ganeti CVE ID : CVE-2015-7944 CVE-2015-7945 Pierre Kim discovered two vulnerabilities in the restful API of Ganeti, a virtual server cluster management tool. SSL parameter negotiation could result in denial of service and the DRBD secret could leak. For the oldstable distribution (wheezy), these problems have been fixed in version 2.5.2-1+deb7u1. For the stable distribution (jessie), these problems have been fixed in version 2.12.4-1+deb8u2. For the unstable distribution (sid), these problems have been fixed in version 2.15.2-1. We recommend that you upgrade your ganeti packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJWhmqoAAoJEBDCk7bDfE42flAQAJNWgnyqa7wlwNsyzedfWUVm SqzkbJuR/Ab2SE0eymo8IDdPu9Iff6HT0DaP3Miyl29C+dnAWDOSFWz+yyA5DXnX h93pX/IHpBxE3Jtn58LnM6h3oRYyBHHoSuENz/VGAyYmxAeCYtISnUdgzFa9/yfh jleCy6mhMlRW/kblamt4iAIeR+kWYJBW267XEiqAqPwUcQ7KJV8cy2ChSoa2BdtD Cwoh8WuvU9060nGKywnPuZf9XbB6dGuLY74b7hfIAv0YLi6bEAcfTVMl6lIhmmuR DYqj0T7YH+8sCIU8EzEYzENxSf7odrOMtBAOV7vcAXFGy6iAMZ72Z1xHWYUVR9EP CTP1Vq2h/NKZXBF0TM19WoKIAW5F2qGBLwwqgR+sa5159SxNufKh1eXSaSrzcjPR h58tIgRlQU8l0CYrYpvtrwM8JfCnvUVtoEH3IVwnUZuDAStKV0UXzW5N1ReOXmyo 09+NTv8xr+3Z6JiXdjM+FtzoYbhbMc/DdvV9EDzcvbugqGor0HFhSPotPqyUK8g3 E3CKIKbJuuMEeCM+ZxwHde5gODV5KMgM8UUh19OTcVVpxOpc+jm5aSqaj91m6XPv SGQGoCH5yTfVTF4XT3cSxjrS2bmfvM+5WU++l0IbAM6NYDLpq4JfrKkMVpuGBpS3 EQrgxhrzQq3UggQpenll =2CII -----END PGP SIGNATURE-----