CVE-2015-7944

Source
https://nvd.nist.gov/vuln/detail/CVE-2015-7944
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2015-7944.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2015-7944
Related
Published
2017-08-18T17:29:01Z
Modified
2025-03-14T05:01:22Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

The RESTful control interface (aka RAPI or ganeti-rapi) in Ganeti before 2.9.7, 2.10.x before 2.10.8, 2.11.x before 2.11.8, 2.12.x before 2.12.6, 2.13.x before 2.13.3, 2.14.x before 2.14.2, and 2.15.x before 2.15.2, when used in SSL mode, allows remote attackers to cause a denial of service (resource consumption) via SSL parameter renegotiation.

References

Affected packages

Debian:11 / ganeti

Package

Name
ganeti
Purl
pkg:deb/debian/ganeti?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.15.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / ganeti

Package

Name
ganeti
Purl
pkg:deb/debian/ganeti?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.15.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / ganeti

Package

Name
ganeti
Purl
pkg:deb/debian/ganeti?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.15.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}