{"type":"TYPE_SECURITY","shortCode":"RL","name":"RLSA-2022:7958","synopsis":"Low: libguestfs security, bug fix, and enhancement update","severity":"SEVERITY_LOW","topic":"An update for libguestfs is now available for Rocky Linux 9.\nRocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.","description":"The libguestfs packages contain a library used for accessing and modifying virtual machine disk images.\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\nAdditional Changes:\nFor detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.","solution":null,"affectedProducts":["Rocky Linux 9"],"fixes":[{"ticket":"1674392","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1674392","description":"No return values from a directory listing when there are simply too many files in that directory (NULL value return)"},{"ticket":"1794518","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1794518","description":"Rewrite libguestfs use of setfiles so that it doesn't stop on ext4 immutable bits"},{"ticket":"1809453","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1809453","description":"[RFE] Add support for LUKS encrypted disks with Clevis & Tang"},{"ticket":"1844341","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1844341","description":"The duplicate block device is listed when iface is set to 'virtio'"},{"ticket":"1965941","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1965941","description":"lvm-set-filter failed in guestfish with the latest lvm2 package"},{"ticket":"2033247","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2033247","description":"document encrypted RBD disk limitation"},{"ticket":"2059285","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2059285","description":"RFE: Rebase libguestfs to 1.48 in RHEL 9.1"},{"ticket":"2065172","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2065172","description":"SHA 1 signatures required to inspect packages in RHEL 6 guests [rhel-9.1.0]"},{"ticket":"2084568","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2084568","description":"Disable 5-level page tables when using -cpu max"},{"ticket":"2086368","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2086368","description":"Add Rocky Linux to list of REDHAT distros for code generation"},{"ticket":"2097718","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2097718","description":"Please build and ship php bindings to libguestfs"},{"ticket":"2100862","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2100862","description":"CVE-2022-2211 libguestfs: Buffer overflow in get_keys leads to DoS"},{"ticket":"2117004","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2117004","description":"RFE: Add support for Zstandard compression to guestfs_file_architecture API"}],"cves":[{"name":"CVE-2022-2211","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-2211.json","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-119"}],"references":[],"publishedAt":"2023-01-26T21:50:01.708977Z","rpms":{},"rebootSuggested":false,"buildReferences":[]}

Rocky Linux: RLSA-2022:7958 libguestfs security

January 26, 2023
An update for libguestfs is now available for Rocky Linux 9. Rocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Low

Summary

An update for libguestfs is now available for Rocky Linux 9. Rocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


The libguestfs packages contain a library used for accessing and modifying virtual machine disk images. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.

RPMs

References

No References

CVEs

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2211.json

Severity
Name: RLSA-2022:7958
Affected Products: Rocky Linux 9

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=1674392

https://bugzilla.redhat.com/show_bug.cgi?id=1794518

https://bugzilla.redhat.com/show_bug.cgi?id=1809453

https://bugzilla.redhat.com/show_bug.cgi?id=1844341

https://bugzilla.redhat.com/show_bug.cgi?id=1965941

https://bugzilla.redhat.com/show_bug.cgi?id=2033247

https://bugzilla.redhat.com/show_bug.cgi?id=2059285

https://bugzilla.redhat.com/show_bug.cgi?id=2065172

https://bugzilla.redhat.com/show_bug.cgi?id=2084568

https://bugzilla.redhat.com/show_bug.cgi?id=2086368

https://bugzilla.redhat.com/show_bug.cgi?id=2097718

https://bugzilla.redhat.com/show_bug.cgi?id=2100862

https://bugzilla.redhat.com/show_bug.cgi?id=2117004


Related News