A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "guestfsd-dbgsym": "1:1.46.2-10ubuntu3", "php-guestfs": "1:1.46.2-10ubuntu3", "libguestfs-java": "1:1.46.2-10ubuntu3", "libguestfs-rsync": "1:1.46.2-10ubuntu3", "php-guestfs-dbgsym": "1:1.46.2-10ubuntu3", "libguestfs-java-dbgsym": "1:1.46.2-10ubuntu3", "guestfish": "1:1.46.2-10ubuntu3", "libguestfs-gobject-1.0-0": "1:1.46.2-10ubuntu3", "python3-guestfs": "1:1.46.2-10ubuntu3", "libguestfs-tools": "1:1.46.2-10ubuntu3", "libguestfs-ocaml": "1:1.46.2-10ubuntu3", "libguestfs-xfs": "1:1.46.2-10ubuntu3", "libguestfs-nilfs": "1:1.46.2-10ubuntu3", "ruby-guestfs-dbgsym": "1:1.46.2-10ubuntu3", "libguestfs-gobject-dev": "1:1.46.2-10ubuntu3", "libguestfs-reiserfs": "1:1.46.2-10ubuntu3", "golang-guestfs-dev": "1:1.46.2-10ubuntu3", "libguestfs-jfs": "1:1.46.2-10ubuntu3", "libguestfs0-dbgsym": "1:1.46.2-10ubuntu3", "guestfsd": "1:1.46.2-10ubuntu3", "libguestfs-gfs2": "1:1.46.2-10ubuntu3", "guestmount-dbgsym": "1:1.46.2-10ubuntu3", "guestmount": "1:1.46.2-10ubuntu3", "libguestfs-rescue": "1:1.46.2-10ubuntu3", "libguestfs-perl-dbgsym": "1:1.46.2-10ubuntu3", "libguestfs-ocaml-dbgsym": "1:1.46.2-10ubuntu3", "libguestfs-gobject-1.0-0-dbgsym": "1:1.46.2-10ubuntu3", "libguestfs0": "1:1.46.2-10ubuntu3", "lua-guestfs": "1:1.46.2-10ubuntu3", "libguestfs-ocaml-dev": "1:1.46.2-10ubuntu3", "libguestfs-perl": "1:1.46.2-10ubuntu3", "python3-guestfs-dbgsym": "1:1.46.2-10ubuntu3", "libguestfs-hfsplus": "1:1.46.2-10ubuntu3", "libguestfs-dev": "1:1.46.2-10ubuntu3", "guestfish-dbgsym": "1:1.46.2-10ubuntu3", "libguestfs-zfs": "1:1.46.2-10ubuntu3", "lua-guestfs-dbgsym": "1:1.46.2-10ubuntu3", "libguestfs-tools-dbgsym": "1:1.46.2-10ubuntu3", "gir1.2-guestfs-1.0": "1:1.46.2-10ubuntu3", "ruby-guestfs": "1:1.46.2-10ubuntu3" } ] }