Download
| Alert*
oval:org.secpod.oval:def:600994
The recent security update for libvirt was found to cause a regression. The kvm/qemu processes weren"t run as the `kvm` user anymore in order to fix the file/device ownership changes, but the processes where not correctly configured to use the `kvm` group either. When the user would try to run a vir ... oval:org.secpod.oval:def:600988 Bastian Blank discovered that libvirtd, a daemon for management of virtual machines, network and storage, would change ownership of devices files so they would be owned by user `libvirt-qemu` and group `kvm`, which is a general purpose group not specific to libvirt, allowing unintended write access ... |