Security update for spice-vdagent

SUSE Security Update: Security update for spice-vdagent
Announcement ID: SUSE-SU-2021:2766-1
Rating: moderate
References: #1177780 #1177781 #1177782 #1177783
Cross-References:CVE-2020-25650 CVE-2020-25651 CVE-2020-25652 CVE-2020-25653
Affected Products:
  • SUSE Linux Enterprise Server 12-SP5

An update that fixes four vulnerabilities is now available.


This update for spice-vdagent fixes the following issues:

  • CVE-2020-25650: memory DoS via arbitrary entries in `active_xfers` hash table (bsc#1177780)
  • CVE-2020-25651: possible file transfer DoS and information leak via `active_xfers` hash map (bsc#1177781)
  • CVE-2020-25652: possibility to exhaust file descriptors in `vdagentd` (bsc#1177782)
  • CVE-2020-25653: UNIX domain socket peer PID retrieved via `SO_PEERCRED` is subject to race condition (bsc#1177783)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Server 12-SP5:
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-2766=1

Package List:

  • SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
    • spice-vdagent-0.16.0-8.8.2
    • spice-vdagent-debuginfo-0.16.0-8.8.2
    • spice-vdagent-debugsource-0.16.0-8.8.2