[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:600994
The recent security update for libvirt was found to cause a regression. The kvm/qemu processes weren"t run as the `kvm` user anymore in order to fix the file/device ownership changes, but the processes where not correctly configured to use the `kvm` group either. When the user would try to run a vir ...

oval:org.secpod.oval:def:600988
Bastian Blank discovered that libvirtd, a daemon for management of virtual machines, network and storage, would change ownership of devices files so they would be owned by user `libvirt-qemu` and group `kvm`, which is a general purpose group not specific to libvirt, allowing unintended write access ...

CPE    72
cpe:/a:redhat:libvirt:0.0.4
cpe:/a:redhat:libvirt:0.2.2
cpe:/a:redhat:libvirt:0.4.0
cpe:/a:redhat:libvirt:0.0.5
...
CWE    1
CWE-264
*CVE
CVE-2013-1766

© SecPod Technologies