CVE-2020-25653

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2020-25653
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-25653.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-25653
Related
Published
2020-11-26T02:15:11Z
Modified
2024-06-06T01:01:30.885981Z
Severity
  • 6.3 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
[none]
Details

A race condition vulnerability was found in the way the spice-vdagentd daemon handled new client connections. This flaw may allow an unprivileged local guest user to become the active agent for spice-vdagentd, possibly resulting in a denial of service or information leakage from the host. The highest threat from this vulnerability is to data confidentiality as well as system availability. This flaw affects spice-vdagent versions 0.20 and prior.

References

Affected packages

Git / gitlab.freedesktop.org/spice/linux/vd_agent

Affected ranges

Type
GIT
Repo
https://gitlab.freedesktop.org/spice/linux/vd_agent
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

spice-vdagent-0.*

spice-vdagent-0.10.0
spice-vdagent-0.10.1
spice-vdagent-0.12.0
spice-vdagent-0.12.1
spice-vdagent-0.14.0
spice-vdagent-0.15.0
spice-vdagent-0.16.0
spice-vdagent-0.17.0
spice-vdagent-0.18.0
spice-vdagent-0.19.0
spice-vdagent-0.20.0
spice-vdagent-0.6.3
spice-vdagent-0.8.0
spice-vdagent-0.8.1