exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3431-1

Debian Security Advisory 3431-1
Posted Jan 1, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3431-1 - Pierre Kim discovered two vulnerabilities in the restful API of Ganeti, a virtual server cluster management tool. SSL parameter negotiation could result in denial of service and the DRBD secret could leak.

tags | advisory, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2015-7944, CVE-2015-7945
SHA-256 | a01b455cafe98df2e893e64cd046ef310b011a73d6fce093f20678aa83e07f64

Debian Security Advisory 3431-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3431-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
January 01, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : ganeti
CVE ID : CVE-2015-7944 CVE-2015-7945

Pierre Kim discovered two vulnerabilities in the restful API of Ganeti,
a virtual server cluster management tool. SSL parameter negotiation
could result in denial of service and the DRBD secret could leak.

For the oldstable distribution (wheezy), these problems have been fixed
in version 2.5.2-1+deb7u1.

For the stable distribution (jessie), these problems have been fixed in
version 2.12.4-1+deb8u2.

For the unstable distribution (sid), these problems have been fixed in
version 2.15.2-1.

We recommend that you upgrade your ganeti packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=2CII
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close