[SECURITY] [DSA 4003-1] libvirt security update

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4003-1                   security@xxxxxxxxxx
https://www.debian.org/security/                     Salvatore Bonaccorso
October 19, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libvirt
CVE ID         : CVE-2017-1000256
Debian Bug     : 878799

Daniel P. Berrange reported that Libvirt, a virtualisation abstraction
library, does not properly handle the default_tls_x509_verify (and
related) parameters in qemu.conf when setting up TLS clients and servers
in QEMU, resulting in TLS clients for character devices and disk devices
having verification turned off and ignoring any errors while validating
the server certificate.

More informations in https://security.libvirt.org/2017/0002.html .

For the stable distribution (stretch), this problem has been fixed in
version 3.0.0-4+deb9u1.

For the unstable distribution (sid), this problem has been fixed in
version 3.8.0-3.

We recommend that you upgrade your libvirt packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
-----BEGIN PGP SIGNATURE-----
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=A8fk
-----END PGP SIGNATURE-----




[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux