Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2011-1615

Опубликовано: 14 дек. 2011
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2011-1615: virt-v2v security and bug fix update (LOW)

[0.8.3-5]

  • Fix regression when converting Win7 32 bit to RHEV (RHBZ#738236)

[0.8.3-4] [element]

[0.8.3-3]

  • Add missing dependency on new Sys::Virt

[0.8.3-2]

  • Fix for CVE-2011-1773
  • Document limitations wrt Windows Recovery Console

[0.8.3-1]

  • Include missing virt-v2v.db
  • Rebase to upstream release 0.8.3

[0.8.2-2]

  • Split configuration into /etc/virt-v2v.conf and /var/lib/virt-v2v/virt-v2v.db
  • Improve usability as non-root user (RHBZ#671094)
  • Update man pages to use -os as appropriate (RHBZ#694370)
  • Warn if user specifies both -n and -b (RHBZ#700759)
  • Fix cleanup when multiboot OS is detected (RHBZ#702007)
  • Ensure the cirrus driver is installed if required (RHBZ#708961)
  • Remove unnecessary dep on perl(IO::Handle)
  • Fix conversion of xen guests using aio storage backend.
  • Suppress warning for chainloader grub entries.
  • Only configure a single scsi_hostadapter for converted VMware guests.

[0.8.2-1]

  • Rebase to upstream release 0.8.2

[0.7.1-4]

  • Fix detection of Windows XP Pro x64 (RHBZ#679017)
  • Fix error message when converting Red Hat Desktop (RHBZ#678950)

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

virt-v2v

0.8.3-5.el6

Связанные CVE

Связанные уязвимости

redhat
почти 16 лет назад

virt-v2v before 0.8.4 does not preserve the VNC console password when converting a guest, which allows local users to bypass the intended VNC authentication by connecting without a password.

nvd
больше 11 лет назад

virt-v2v before 0.8.4 does not preserve the VNC console password when converting a guest, which allows local users to bypass the intended VNC authentication by connecting without a password.

github
больше 3 лет назад

virt-v2v before 0.8.4 does not preserve the VNC console password when converting a guest, which allows local users to bypass the intended VNC authentication by connecting without a password.