Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2022-7959-01

Red Hat Security Advisory 2022-7959-01 - guestfs-tools is a set of tools that can be used to make batch configuration changes to guests, get disk used/free statistics, perform backups and guest clones, change registry/UUID/hostname info, build guests from scratch, and much more. Issues addressed include buffer overflow and denial of service vulnerabilities.

Packet Storm
#vulnerability#linux#red_hat#dos#js#buffer_overflow

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Low: guestfs-tools security, bug fix, and enhancement update
Advisory ID: RHSA-2022:7959-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2022:7959
Issue date: 2022-11-15
CVE Names: CVE-2022-2211
====================================================================

  1. Summary:

An update for guestfs-tools is now available for Red Hat Enterprise Linux

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 9) - aarch64, noarch, s390x, x86_64

  1. Description:

guestfs-tools is a set of tools that can be used to make batch
configuration changes to guests, get disk used/free statistics, perform
backups and guest clones, change registry/UUID/hostname info, build guests
from scratch, and much more.

Security Fix(es):

  • libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 9.1 Release Notes linked from the References section.

  1. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

2059286 - RFE: Rebase guestfs-tools to 1.48 in RHEL 9.1
2072493 - [RFE] Request to add lvm system.devices cleanup operation to virt-sysprep
2075718 - Having to use “–selinux-relabel” is not intuitive given Red Hat products default to selinux enabled.
2089748 - Removal of “–selinux-relabel” option breaks existing scripts
2100862 - CVE-2022-2211 libguestfs: Buffer overflow in get_keys leads to DoS
2106286 - virt-sysprep: make an effort to support LUKS on LV

  1. Package List:

Red Hat Enterprise Linux AppStream (v. 9):

Source:
guestfs-tools-1.48.2-5.el9.src.rpm

aarch64:
guestfs-tools-1.48.2-5.el9.aarch64.rpm
guestfs-tools-debuginfo-1.48.2-5.el9.aarch64.rpm
guestfs-tools-debugsource-1.48.2-5.el9.aarch64.rpm

noarch:
virt-win-reg-1.48.2-5.el9.noarch.rpm

s390x:
guestfs-tools-1.48.2-5.el9.s390x.rpm
guestfs-tools-debuginfo-1.48.2-5.el9.s390x.rpm
guestfs-tools-debugsource-1.48.2-5.el9.s390x.rpm

x86_64:
guestfs-tools-1.48.2-5.el9.x86_64.rpm
guestfs-tools-debuginfo-1.48.2-5.el9.x86_64.rpm
guestfs-tools-debugsource-1.48.2-5.el9.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2022-2211
https://access.redhat.com/security/updates/classification/#low
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index

  1. Contact:

The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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j1SI
-----END PGP SIGNATURE-----

RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

RHSA-2022:7958: Red Hat Security Advisory: libguestfs security, bug fix, and enhancement update

An update for libguestfs is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2211: libguestfs: Buffer overflow in get_keys leads to DoS

RHSA-2022:7968: Red Hat Security Advisory: virt-v2v security, bug fix, and enhancement update

An update for virt-v2v is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2211: libguestfs: Buffer overflow in get_keys leads to DoS

RHSA-2022:7959: Red Hat Security Advisory: guestfs-tools security, bug fix, and enhancement update

An update for guestfs-tools is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2211: libguestfs: Buffer overflow in get_keys leads to DoS

RHSA-2022:7472: Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update

An update for the virt:rhel and virt-devel:rhel modules is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3507: QEMU: fdc: heap buffer overflow in DMA read data transfers * CVE-2022-0897: libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service * CVE-2022-2211: libguestfs: Buffer overflow in get_keys leads to DoS * CVE-2022-23645: swtpm: Unchecked header size indicator against expected size

CVE-2022-2211: Red Hat Customer Portal - Access to 24x7 support and knowledge

A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor.

Packet Storm: Latest News

Ivanti EPM Agent Portal Command Execution