MGASA-2015-0394

Source
https://advisories.mageia.org/MGASA-2015-0394.html
Import Source
https://advisories.mageia.org/MGASA-2015-0394.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0394
Related
Published
2015-10-09T18:47:39Z
Modified
2015-10-09T18:39:06Z
Summary
Updated spice packages fix security vulnerabilities
Details

Frediano Ziglio discovered multiple buffer overflows, undefined behavior signed integer operations, race conditions, memory leaks, and denial of service issues in Spice. A malicious guest operating system could potentially exploit these issues to escape virtualization (CVE-2015-5260, CVE-2015-5261).

References
Credits

Affected packages

Mageia:5 / spice

Package

Name
spice
Purl
pkg:rpm/mageia/spice?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.12.5-2.2.mga5

Ecosystem specific

{
    "section": "core"
}