CVE-2015-7944
18.08.2017, 17:29
The RESTful control interface (aka RAPI or ganeti-rapi) in Ganeti before 2.9.7, 2.10.x before 2.10.8, 2.11.x before 2.11.8, 2.12.x before 2.12.6, 2.13.x before 2.13.3, 2.14.x before 2.14.2, and 2.15.x before 2.15.2, when used in SSL mode, allows remote attackers to cause a denial of service (resource consumption) via SSL parameter renegotiation.Enginsight
| Vendor | Product | Version |
|---|---|---|
| spi-inc | ganeti | 𝑥 ≤ 2.9.6 |
| spi-inc | ganeti | 2.10.0 |
| spi-inc | ganeti | 2.10.0:beta1 |
| spi-inc | ganeti | 2.10.0:rc1 |
| spi-inc | ganeti | 2.10.0:rc2 |
| spi-inc | ganeti | 2.10.0:rc3 |
| spi-inc | ganeti | 2.10.1 |
| spi-inc | ganeti | 2.10.2 |
| spi-inc | ganeti | 2.10.3 |
| spi-inc | ganeti | 2.10.4 |
| spi-inc | ganeti | 2.10.5 |
| spi-inc | ganeti | 2.10.6 |
| spi-inc | ganeti | 2.10.7 |
| spi-inc | ganeti | 2.11.0 |
| spi-inc | ganeti | 2.11.0:beta1 |
| spi-inc | ganeti | 2.11.0:rc1 |
| spi-inc | ganeti | 2.11.1 |
| spi-inc | ganeti | 2.11.2 |
| spi-inc | ganeti | 2.11.3 |
| spi-inc | ganeti | 2.11.4 |
| spi-inc | ganeti | 2.11.5 |
| spi-inc | ganeti | 2.11.6 |
| spi-inc | ganeti | 2.11.7 |
| spi-inc | ganeti | 2.12.0 |
| spi-inc | ganeti | 2.12.0:beta1 |
| spi-inc | ganeti | 2.12.0:rc1 |
| spi-inc | ganeti | 2.12.0:rc2 |
| spi-inc | ganeti | 2.12.1 |
| spi-inc | ganeti | 2.12.2 |
| spi-inc | ganeti | 2.12.3 |
| spi-inc | ganeti | 2.12.4 |
| spi-inc | ganeti | 2.12.5 |
| spi-inc | ganeti | 2.13.0 |
| spi-inc | ganeti | 2.13.0:beta1 |
| spi-inc | ganeti | 2.13.0:rc1 |
| spi-inc | ganeti | 2.13.1 |
| spi-inc | ganeti | 2.13.2 |
| spi-inc | ganeti | 2.14.0 |
| spi-inc | ganeti | 2.14.0:beta1 |
| spi-inc | ganeti | 2.14.0:beta2 |
| spi-inc | ganeti | 2.14.0:rc1 |
| spi-inc | ganeti | 2.14.0:rc2 |
| spi-inc | ganeti | 2.14.1 |
| spi-inc | ganeti | 2.15.0 |
| spi-inc | ganeti | 2.15.0:beta1 |
| spi-inc | ganeti | 2.15.0:rc1 |
| spi-inc | ganeti | 2.15.1 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References