Security update for spice-vdagent
SUSE Security Update: Security update for spice-vdagentAnnouncement ID: | SUSE-SU-2021:2766-1 |
Rating: | moderate |
References: | #1177780 #1177781 #1177782 #1177783 |
Cross-References: | CVE-2020-25650 CVE-2020-25651 CVE-2020-25652 CVE-2020-25653 |
Affected Products: |
|
An update that fixes four vulnerabilities is now available.
Description:
This update for spice-vdagent fixes the following issues:
- CVE-2020-25650: memory DoS via arbitrary entries in `active_xfers` hash table (bsc#1177780)
- CVE-2020-25651: possible file transfer DoS and information leak via `active_xfers` hash map (bsc#1177781)
- CVE-2020-25652: possibility to exhaust file descriptors in `vdagentd` (bsc#1177782)
- CVE-2020-25653: UNIX domain socket peer PID retrieved via `SO_PEERCRED` is subject to race condition (bsc#1177783)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 12-SP5:
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-2766=1
Package List:
- SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
- spice-vdagent-0.16.0-8.8.2
- spice-vdagent-debuginfo-0.16.0-8.8.2
- spice-vdagent-debugsource-0.16.0-8.8.2
References:
- https://www.suse.com/security/cve/CVE-2020-25650.html
- https://www.suse.com/security/cve/CVE-2020-25651.html
- https://www.suse.com/security/cve/CVE-2020-25652.html
- https://www.suse.com/security/cve/CVE-2020-25653.html
- https://bugzilla.suse.com/1177780
- https://bugzilla.suse.com/1177781
- https://bugzilla.suse.com/1177782
- https://bugzilla.suse.com/1177783