Headline
RHSA-2021:1791: Red Hat Security Advisory: spice-vdagent security and bug fix update
An update for spice-vdagent is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.The spice-vdagent packages provide a SPICE agent for Linux guests. Security Fix(es):
- spice-vdagent: possible file transfer DoS and information leak via active_xfers hash map (CVE-2020-25651)
- spice-vdagent: UNIX domain socket peer PID retrieved via SO_PEERCRED is subject to race condition (CVE-2020-25653)
- spice-vdagent: memory DoS via arbitrary entries in active_xfers hash table (CVE-2020-25650)
- spice-vdagent: possibility to exhaust file descriptors in vdagentd (CVE-2020-25652) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section. Related CVEs:
- CVE-2020-25650: spice-vdagent: memory DoS via arbitrary entries in active_xfers hash table
- CVE-2020-25651: spice-vdagent: possible file transfer DoS and information leak via active_xfers hash map
- CVE-2020-25652: spice-vdagent: possibility to exhaust file descriptors in vdagentd
- CVE-2020-25653: spice-vdagent: UNIX domain socket peer PID retrieved via SO_PEERCRED is subject to race condition