{"id":"CVE-2020-25650","details":"A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service for spice-vdagentd or even other processes in the VM system. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and previous versions.","modified":"2026-04-16T04:34:39.351230173Z","published":"2020-11-25T15:15:11.583Z","related":["ALSA-2021:1791","SUSE-SU-2020:3268-1","SUSE-SU-2021:2614-1","SUSE-SU-2021:2766-1","SUSE-SU-2021:2803-1","openSUSE-SU-2021:2614-1","openSUSE-SU-2024:11399-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQT56LATVTB2DJOVVJOKQVMVUXYCT2VB/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIWJ2EIQXWEA2VDBODEATHAT37X4CREP/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00012.html"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1886345"},{"type":"EVIDENCE","url":"https://www.openwall.com/lists/oss-security/2020/11/04/1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/spice/linux/vd_agent","events":[{"introduced":"0"},{"last_affected":"bfbb63d3aef2e741eeeec402f2f0b5469f42f0fa"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.20.0"}]}}],"versions":["spice-vdagent-0.10.0","spice-vdagent-0.10.1","spice-vdagent-0.12.0","spice-vdagent-0.12.1","spice-vdagent-0.14.0","spice-vdagent-0.15.0","spice-vdagent-0.16.0","spice-vdagent-0.17.0","spice-vdagent-0.18.0","spice-vdagent-0.19.0","spice-vdagent-0.20.0","spice-vdagent-0.6.3","spice-vdagent-0.8.0","spice-vdagent-0.8.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-25650.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}