{"id":"MGASA-2015-0394","summary":"Updated spice packages fix security vulnerabilities","details":"Frediano Ziglio discovered multiple buffer overflows, undefined behavior\nsigned integer operations, race conditions, memory leaks, and denial\nof service issues in Spice. A malicious guest operating system could\npotentially exploit these issues to escape virtualization (CVE-2015-5260,\nCVE-2015-5261).\n","modified":"2026-04-16T06:24:08.938841575Z","published":"2015-10-09T18:47:39Z","upstream":["CVE-2015-5260","CVE-2015-5261"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0394.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=16919"},{"type":"WEB","url":"http://www.ubuntu.com/usn/usn-2766-1/"}],"affected":[{"package":{"name":"spice","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/spice?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.12.5-2.2.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0394.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}