Описание
libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.
Релиз | Статус | Примечание |
---|---|---|
artful | released | 3.6.0-1ubuntu6.3 |
devel | not-affected | 4.0.0-1ubuntu2 |
esm-infra-legacy/trusty | not-affected | code not present |
esm-infra/xenial | not-affected | code not present |
precise/esm | not-affected | code not present |
trusty | not-affected | code not present |
trusty/esm | not-affected | code not present |
upstream | released | 3.8.0-3 |
vivid/ubuntu-core | DNE | |
xenial | not-affected | code not present |
Показывать по
EPSS
6.8 Medium
CVSS2
8.1 High
CVSS3
Связанные уязвимости
libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.
libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.
libvirt version 2.3.0 and later is vulnerable to a bad default configu ...
EPSS
6.8 Medium
CVSS2
8.1 High
CVSS3