SUSE-SU-2021:2766-1

Source
https://www.suse.com/support/update/announcement/2021/suse-su-20212766-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:2766-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2021:2766-1
Related
Published
2021-08-17T15:19:13Z
Modified
2021-08-17T15:19:13Z
Summary
Security update for spice-vdagent
Details

This update for spice-vdagent fixes the following issues:

  • CVE-2020-25650: memory DoS via arbitrary entries in active_xfers hash table (bsc#1177780)
  • CVE-2020-25651: possible file transfer DoS and information leak via active_xfers hash map (bsc#1177781)
  • CVE-2020-25652: possibility to exhaust file descriptors in vdagentd (bsc#1177782)
  • CVE-2020-25653: UNIX domain socket peer PID retrieved via SO_PEERCRED is subject to race condition (bsc#1177783)
References

Affected packages

SUSE:Linux Enterprise Server 12 SP5 / spice-vdagent

Package

Name
spice-vdagent
Purl
pkg:rpm/suse/spice-vdagent&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.16.0-8.8.2

Ecosystem specific

{
    "binaries": [
        {
            "spice-vdagent": "0.16.0-8.8.2"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 SP5 / spice-vdagent

Package

Name
spice-vdagent
Purl
pkg:rpm/suse/spice-vdagent&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.16.0-8.8.2

Ecosystem specific

{
    "binaries": [
        {
            "spice-vdagent": "0.16.0-8.8.2"
        }
    ]
}