CVE-2020-25650

Published: 03 November 2020

A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service for spice-vdagentd or even other processes in the VM system. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and previous versions.

Priority

Low

Status

Package Release Status
spice-vdagent
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo)
Released (0.20.0-1ubuntu0.1)
Ubuntu 20.10 (Groovy Gorilla)
Released (0.20.0-1ubuntu0.1)
Ubuntu 20.04 LTS (Focal Fossa)
Released (0.19.0-2ubuntu0.2)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (0.17.0-1ubuntu2.2)
Ubuntu 16.04 LTS (Xenial Xerus) Needed

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Ubuntu 12.04 ESM (Precise Pangolin) Does not exist