Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 857828 (CVE-2022-2211) - <app-emulation/libguestfs-1.48.4: DoS via buffer overflow in get_keys() function
Summary: <app-emulation/libguestfs-1.48.4: DoS via buffer overflow in get_keys() function
Alias: CVE-2022-2211
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
Whiteboard: ~3 [noglsa cleanup]
Depends on:
Reported: 2022-07-13 02:14 UTC by John Helmert III
Modified: 2022-07-13 04:34 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-07-13 02:14:32 UTC
CVE-2022-2211 (

A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor.

Patch seems to be upstream as 99844660b48ed809e37378262c65d63df6ce4a53
which is in 1.49.3.
Comment 1 Larry the Git Cow gentoo-dev 2022-07-13 04:32:06 UTC
The bug has been referenced in the following commit(s):

commit fe5234f80e05e2beb1564f6b982701084e6ea16b
Author:     Sam James <>
AuthorDate: 2022-07-13 04:29:57 +0000
Commit:     Sam James <>
CommitDate: 2022-07-13 04:31:57 +0000

    app-emulation/libguestfs: add 1.48.4
    Signed-off-by: Sam James <>

 app-emulation/libguestfs/Manifest                 |   1 +
 app-emulation/libguestfs/libguestfs-1.48.4.ebuild | 240 ++++++++++++++++++++++
 2 files changed, 241 insertions(+)
Comment 2 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2022-07-13 04:34:36 UTC
Yeah, indeed fixed in this version too: