RLSA-2021:1791

Source
https://errata.rockylinux.org/RLSA-2021:1791
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2021:1791.json
JSON Data
https://api.test.osv.dev/v1/vulns/RLSA-2021:1791
Related
Published
2021-05-18T06:05:33Z
Modified
2023-02-02T14:10:23.338253Z
Severity
  • 6.4 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:L CVSS Calculator
Summary
Moderate: spice-vdagent security and bug fix update
Details

The spice-vdagent packages provide a SPICE agent for Linux guests.

Security Fix(es):

  • spice-vdagent: possible file transfer DoS and information leak via active_xfers hash map (CVE-2020-25651)

  • spice-vdagent: UNIX domain socket peer PID retrieved via SO_PEERCRED is subject to race condition (CVE-2020-25653)

  • spice-vdagent: memory DoS via arbitrary entries in active_xfers hash table (CVE-2020-25650)

  • spice-vdagent: possibility to exhaust file descriptors in vdagentd (CVE-2020-25652)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / spice-vdagent

Package

Name
spice-vdagent
Purl
pkg:rpm/rocky-linux/spice-vdagent?distro=rocky-linux-8-4-legacy&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:0.20.0-3.el8