Security and bug fix update for libvirt librar
Reporter | Title | Published | Views | Family All 43 |
---|---|---|---|---|
![]() | CentOS 5 : libvirt (CESA-2013:0127) | 17 Jan 201300:00 | – | nessus |
![]() | CentOS 6 : libvirt (CESA-2012:0748) | 11 Jul 201200:00 | – | nessus |
![]() | Scientific Linux Security Update : libvirt on SL6.x i386/x86_64 (20120620) | 1 Aug 201200:00 | – | nessus |
![]() | Linux Distros Unpatched Vulnerability : CVE-2012-2693 | 4 Mar 202500:00 | – | nessus |
![]() | Oracle Linux 5 : libvirt (ELSA-2013-0127) | 12 Jul 201300:00 | – | nessus |
![]() | RHEL 6 : libvirt (RHSA-2012:0748) | 20 Jun 201200:00 | – | nessus |
![]() | Oracle Linux 6 : libvirt (ELSA-2012-0748) | 12 Jul 201300:00 | – | nessus |
![]() | RHEL 5 : libvirt (RHSA-2013:0127) | 24 Jan 201300:00 | – | nessus |
![]() | Scientific Linux Security Update : libvirt on SL5.x i386/x86_64 (20130108) | 17 Jan 201300:00 | – | nessus |
![]() | CVE-2012-2693 | 17 Jun 201201:00 | – | cvelist |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | ia64 | libvirt-python | 0.8.2-29.el5 | libvirt-python-0.8.2-29.el5.ia64.rpm |
RedHat | 5 | i386 | libvirt-python | 0.8.2-29.el5 | libvirt-python-0.8.2-29.el5.i386.rpm |
RedHat | 5 | i386 | libvirt-debuginfo | 0.8.2-29.el5 | libvirt-debuginfo-0.8.2-29.el5.i386.rpm |
RedHat | 5 | src | libvirt | 0.8.2-29.el5 | libvirt-0.8.2-29.el5.src.rpm |
RedHat | 5 | ia64 | libvirt | 0.8.2-29.el5 | libvirt-0.8.2-29.el5.ia64.rpm |
RedHat | 5 | x86_64 | libvirt-debuginfo | 0.8.2-29.el5 | libvirt-debuginfo-0.8.2-29.el5.x86_64.rpm |
RedHat | 5 | i386 | libvirt-devel | 0.8.2-29.el5 | libvirt-devel-0.8.2-29.el5.i386.rpm |
RedHat | 5 | x86_64 | libvirt-devel | 0.8.2-29.el5 | libvirt-devel-0.8.2-29.el5.x86_64.rpm |
RedHat | 5 | x86_64 | libvirt-python | 0.8.2-29.el5 | libvirt-python-0.8.2-29.el5.x86_64.rpm |
RedHat | 5 | x86_64 | libvirt | 0.8.2-29.el5 | libvirt-0.8.2-29.el5.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo