—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
– ————————————————————————-
Debian Security Advisory DSA-3431-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
January 01, 2016 https://www.debian.org/security/faq
– ————————————————————————-
Package : ganeti
CVE ID : CVE-2015-7944 CVE-2015-7945
Pierre Kim discovered two vulnerabilities in the restful API of Ganeti,
a virtual server cluster management tool. SSL parameter negotiation
could result in denial of service and the DRBD secret could leak.
For the oldstable distribution (wheezy), these problems have been fixed
in version 2.5.2-1+deb7u1.
For the stable distribution (jessie), these problems have been fixed in
version 2.12.4-1+deb8u2.
For the unstable distribution (sid), these problems have been fixed in
version 2.15.2-1.
We recommend that you upgrade your ganeti packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=2CII
—–END PGP SIGNATURE—–