{"id":"CVE-2020-25653","details":"A race condition vulnerability was found in the way the spice-vdagentd daemon handled new client connections. This flaw may allow an unprivileged local guest user to become the active agent for spice-vdagentd, possibly resulting in a denial of service or information leakage from the host. The highest threat from this vulnerability is to data confidentiality as well as system availability. This flaw affects spice-vdagent versions 0.20 and prior.","modified":"2026-03-14T10:06:54.101234Z","published":"2020-11-26T02:15:11.933Z","related":["ALSA-2021:1791","MGASA-2020-0474","SUSE-SU-2020:3268-1","SUSE-SU-2021:2614-1","SUSE-SU-2021:2766-1","SUSE-SU-2021:2803-1","openSUSE-SU-2021:2614-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQT56LATVTB2DJOVVJOKQVMVUXYCT2VB/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIWJ2EIQXWEA2VDBODEATHAT37X4CREP/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00012.html"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1886372"},{"type":"EVIDENCE","url":"https://www.openwall.com/lists/oss-security/2020/11/04/1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/spice/linux/vd_agent","events":[{"introduced":"0"},{"last_affected":"bfbb63d3aef2e741eeeec402f2f0b5469f42f0fa"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.20.0"}]}}],"versions":["spice-vdagent-0.10.0","spice-vdagent-0.10.1","spice-vdagent-0.12.0","spice-vdagent-0.12.1","spice-vdagent-0.14.0","spice-vdagent-0.15.0","spice-vdagent-0.16.0","spice-vdagent-0.17.0","spice-vdagent-0.18.0","spice-vdagent-0.19.0","spice-vdagent-0.20.0","spice-vdagent-0.6.3","spice-vdagent-0.8.0","spice-vdagent-0.8.1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-25653.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"}]}