CVE-2022-2211 (https://access.redhat.com/security/cve/CVE-2022-2211): A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor. Patch seems to be upstream as 99844660b48ed809e37378262c65d63df6ce4a53 which is in 1.49.3.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=fe5234f80e05e2beb1564f6b982701084e6ea16b commit fe5234f80e05e2beb1564f6b982701084e6ea16b Author: Sam James <sam@gentoo.org> AuthorDate: 2022-07-13 04:29:57 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2022-07-13 04:31:57 +0000 app-emulation/libguestfs: add 1.48.4 Bug: https://bugs.gentoo.org/857828 Signed-off-by: Sam James <sam@gentoo.org> app-emulation/libguestfs/Manifest | 1 + app-emulation/libguestfs/libguestfs-1.48.4.ebuild | 240 ++++++++++++++++++++++ 2 files changed, 241 insertions(+)
Yeah, indeed fixed in this version too: https://github.com/libguestfs/libguestfs/commits/stable-1.48