Known Vulnerabilities in Red Hat Virtualization 4 page 3