-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3431-2 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso January 14, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : ganeti Debian Bug : 810850 The update for ganeti issued as DSA-3431-1 causes the gnt-instance info command to fail for all instances of type DRBD. Updated packages are now available to address this regression. For reference the original advisory text follows. Pierre Kim discovered two vulnerabilities in the restful API of Ganeti, a virtual server cluster management tool. SSL parameter negotiation could result in denial of service and the DRBD secret could leak. For the oldstable distribution (wheezy), this problem has been fixed in version 2.5.2-1+deb7u2. For the stable distribution (jessie), this problem has been fixed in version 2.12.4-1+deb8u3. We recommend that you upgrade your ganeti packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJWmBhtAAoJEAVMuPMTQ89E6XQP/12qdgCCBfYGDgDIb1ja7BUn HmOHmiZ59HGHamhDLMK8kSPUHSOrtDiluk6/Nzn/rU3E0Pz+/iAu4x93aYDEziC1 PTJNbTU0aQDgioeihAAr6qkU8A9FR3paYktwqadb5g1oRuMPhbF04FBg2UozsX93 ZvgI3cbNrIZ2RVfuAIAtiIOOyzyMUM7XpV2VvtHpX5ZUOgNs3qRqCaU+fIw9GQDd fPpec0dNH/QPCxRCnS6rdKdAFy9d0sPw0kFVSLy1r4MkZb6Qy9w0Mc6SCXZmXnM5 AbsCuUacAhtGSbCh35rt2FBSn5zzPNw8M9AD17RXz1NO1mOEwtKoGanDkdi0rnbQ f7aEjEjitoHXbbkOHcjzPQH60a/D3wSjjVYN1h8hS+SmDG/4kyQxqn7RdW98IyK+ 9nCgAA9+obFtnW2z3wjIW58oI1cejeN3M4BEkF21dNzH6wmdatHkFU3q6Inuuk8k nvRalyF7+MgwIhqi4JHuvGyQhTn7ySqDxDVR3B37cHc3vJrK7pwhkPCsmGuSZeSh lDU9Ku8W48LgIyennD2Bd0w2N6q3YXaAarH7CdyQ7IYT0zLfepmD12JXoCkuSPVN A4zAG/+SAYKIsl4lforjf4wuWcvwtvdEQgBBRqm1NExEZ/20JjtuLhGQYo3/fhte qg4PPH1Qhv2xt9jiYLl1 =0dqF -----END PGP SIGNATURE-----