{"affected":[{"ecosystem_specific":{"binaries":[{"spice-vdagent":"0.21.0-3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Desktop Applications 15 SP3","name":"spice-vdagent","purl":"pkg:rpm/suse/spice-vdagent&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.21.0-3.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for spice-vdagent fixes the following issues:\n\n- Update to version 0.21.0\n- CVE-2020-25650: memory DoS via arbitrary entries in `active_xfers` hash table (bsc#1177780)\n- CVE-2020-25651: possible file transfer DoS and information leak via `active_xfers` hash map (bsc#1177781)\n- CVE-2020-25652: possibility to exhaust file descriptors in `vdagentd` (bsc#1177782) \n- CVE-2020-25653: UNIX domain socket peer PID retrieved via `SO_PEERCRED` is subject to race condition (bsc#1177783) \n","id":"SUSE-SU-2021:2614-1","modified":"2021-08-05T08:19:23Z","published":"2021-08-05T08:19:23Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2021/suse-su-20212614-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173749"},{"type":"REPORT","url":"https://bugzilla.suse.com/1177780"},{"type":"REPORT","url":"https://bugzilla.suse.com/1177781"},{"type":"REPORT","url":"https://bugzilla.suse.com/1177782"},{"type":"REPORT","url":"https://bugzilla.suse.com/1177783"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25650"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25651"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25652"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25653"}],"related":["CVE-2020-25650","CVE-2020-25651","CVE-2020-25652","CVE-2020-25653"],"summary":"Security update for spice-vdagent","upstream":["CVE-2020-25650","CVE-2020-25651","CVE-2020-25652","CVE-2020-25653"]}