{"id":"CVE-2020-25650","details":"A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service for spice-vdagentd or even other processes in the VM system. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and previous versions.","modified":"2026-05-18T05:52:28.179968577Z","published":"2020-11-25T15:15:11.583Z","related":["ALSA-2021:1791","SUSE-SU-2020:3268-1","SUSE-SU-2021:2614-1","SUSE-SU-2021:2766-1","SUSE-SU-2021:2803-1","openSUSE-SU-2021:2614-1","openSUSE-SU-2024:11399-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"9.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"vendor_product":"debian:debian_linux","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"32"},{"last_affected":"33"}],"vendor_product":"fedoraproject:fedora","cpes":["cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"],"source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQT56LATVTB2DJOVVJOKQVMVUXYCT2VB/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIWJ2EIQXWEA2VDBODEATHAT37X4CREP/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00012.html"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1886345"},{"type":"EVIDENCE","url":"https://www.openwall.com/lists/oss-security/2020/11/04/1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/spice/linux/vd_agent","events":[{"introduced":"0"},{"last_affected":"bfbb63d3aef2e741eeeec402f2f0b5469f42f0fa"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"0.20.0"}],"cpe":"cpe:2.3:a:spice-space:spice-vdagent:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["spice-vdagent-0.20.0","spice-vdagent-0.19.0","spice-vdagent-0.18.0","spice-vdagent-0.17.0","spice-vdagent-0.16.0","spice-vdagent-0.15.0","spice-vdagent-0.14.0","spice-vdagent-0.12.1","spice-vdagent-0.12.0","spice-vdagent-0.10.1","spice-vdagent-0.10.0","spice-vdagent-0.8.1","spice-vdagent-0.8.0","spice-vdagent-0.6.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-25650.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}