![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.123207 |
Category: | Oracle Linux Local Security Checks |
Title: | Oracle: Security Advisory (ELSA-2015-0008) |
Summary: | The remote host is missing an update for the 'libvirt' package(s) announced via the ELSA-2015-0008 advisory. |
Description: | Summary: The remote host is missing an update for the 'libvirt' package(s) announced via the ELSA-2015-0008 advisory. Vulnerability Insight: [1.1.1-29.0.1.el7_0.4] - Replace docs/et.png in tarball with blank image [1.1.1-29.el7_0.4] - qemu: blockcopy: Don't remove existing disk mirror info (rhbz#1149078) - qemu: copy: Accept 'format' parameter when copying to a non-existing img (rhbz#1149078) - qemu: reject rather than hang on blockcommit of active layer (rhbz#1150379) - CVE-2014-7823: dumpxml: security hole with migratable flag (CVE-2014-7823) - Fix crash when saving a domain with type none dac label (rhbz#1171124) Affected Software/OS: 'libvirt' package(s) on Oracle Linux 7. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-7823 60010 http://secunia.com/advisories/60010 60895 http://secunia.com/advisories/60895 62058 http://secunia.com/advisories/62058 62303 http://secunia.com/advisories/62303 GLSA-201412-04 http://security.gentoo.org/glsa/glsa-201412-04.xml USN-2404-1 http://www.ubuntu.com/usn/USN-2404-1 http://security.libvirt.org/2014/0007.html openSUSE-SU-2014:1471 http://lists.opensuse.org/opensuse-updates/2014-11/msg00083.html |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |