Описание
A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path /run/spice-vdagentd/spice-vdagent-sock could use this flaw to perform a memory denial of service for spice-vdagentd or even other processes in the VM system. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and previous versions.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 0.17.0-1ubuntu2.2 |
| devel | released | 0.20.0-1ubuntu0.1 |
| esm-apps/xenial | needed | |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/bionic | released | 0.17.0-1ubuntu2.2 |
| esm-infra/focal | released | 0.19.0-2ubuntu0.2 |
| focal | released | 0.19.0-2ubuntu0.2 |
| groovy | released | 0.20.0-1ubuntu0.1 |
| hirsute | released | 0.20.0-1ubuntu0.1 |
| impish | released | 0.20.0-1ubuntu0.1 |
Показывать по
2.1 Low
CVSS2
5.5 Medium
CVSS3
Связанные уязвимости
A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service for spice-vdagentd or even other processes in the VM system. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and previous versions.
A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service for spice-vdagentd or even other processes in the VM system. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and previous versions.
A flaw was found in the way the spice-vdagentd daemon handled file tra ...
A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service for spice-vdagentd or even other processes in the VM system. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and previous versions.
2.1 Low
CVSS2
5.5 Medium
CVSS3