lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 1 Jan 2016 13:04:33 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3431-1] ganeti security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3431-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 01, 2016                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : ganeti
CVE ID         : CVE-2015-7944 CVE-2015-7945

Pierre Kim discovered two vulnerabilities in the restful API of Ganeti,
a virtual server cluster management tool. SSL parameter negotiation
could result in denial of service and the DRBD secret could leak.

For the oldstable distribution (wheezy), these problems have been fixed
in version 2.5.2-1+deb7u1.

For the stable distribution (jessie), these problems have been fixed in
version 2.12.4-1+deb8u2.

For the unstable distribution (sid), these problems have been fixed in
version 2.15.2-1.

We recommend that you upgrade your ganeti packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=2CII
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ