Your submission was sent successfully! Close

CVE-2020-25650

Published: 3 November 2020

A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service for spice-vdagentd or even other processes in the VM system. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and previous versions.

Priority

Low

CVSS 3 base score: 5.5

Status

Package Release Status
spice-vdagent
Launchpad, Ubuntu, Debian
bionic
Released (0.17.0-1ubuntu2.2)
focal
Released (0.19.0-2ubuntu0.2)
groovy
Released (0.20.0-1ubuntu0.1)
hirsute
Released (0.20.0-1ubuntu0.1)
impish
Released (0.20.0-1ubuntu0.1)
jammy
Released (0.20.0-1ubuntu0.1)
precise Does not exist

trusty Does not exist

upstream Needs triage

xenial Ignored
(end of standard support, was needed)