Known Vulnerabilities in Red Hat Virtualization 4.2