vulnerability

SUSE: CVE-2017-1000256: SUSE Linux Security Advisory

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Oct 25, 2017
Added
Oct 25, 2017
Modified
Feb 4, 2022

Description

libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.

Solutions

suse-upgrade-libvirtsuse-upgrade-libvirt-adminsuse-upgrade-libvirt-bash-completionsuse-upgrade-libvirt-clientsuse-upgrade-libvirt-daemonsuse-upgrade-libvirt-daemon-config-networksuse-upgrade-libvirt-daemon-config-nwfiltersuse-upgrade-libvirt-daemon-driver-interfacesuse-upgrade-libvirt-daemon-driver-libxlsuse-upgrade-libvirt-daemon-driver-lxcsuse-upgrade-libvirt-daemon-driver-networksuse-upgrade-libvirt-daemon-driver-nodedevsuse-upgrade-libvirt-daemon-driver-nwfiltersuse-upgrade-libvirt-daemon-driver-qemususe-upgrade-libvirt-daemon-driver-secretsuse-upgrade-libvirt-daemon-driver-storagesuse-upgrade-libvirt-daemon-driver-storage-coresuse-upgrade-libvirt-daemon-driver-storage-disksuse-upgrade-libvirt-daemon-driver-storage-iscsisuse-upgrade-libvirt-daemon-driver-storage-iscsi-directsuse-upgrade-libvirt-daemon-driver-storage-logicalsuse-upgrade-libvirt-daemon-driver-storage-mpathsuse-upgrade-libvirt-daemon-driver-storage-rbdsuse-upgrade-libvirt-daemon-driver-storage-scsisuse-upgrade-libvirt-daemon-hookssuse-upgrade-libvirt-daemon-lxcsuse-upgrade-libvirt-daemon-qemususe-upgrade-libvirt-daemon-xensuse-upgrade-libvirt-develsuse-upgrade-libvirt-docsuse-upgrade-libvirt-libssuse-upgrade-libvirt-lock-sanlocksuse-upgrade-libvirt-nss
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.