{"id":"MGASA-2016-0250","summary":"Updated spice packages fix security vulnerabilities","details":"Updated spice packages fix security vulnerabilities:\n\nA memory allocation flaw, leading to a heap-based buffer overflow, was found in\nspice's smartcard interaction, which runs under the QEMU-KVM context on the\nhost. A user connecting to a guest VM using spice could potentially use this\nflaw to crash the QEMU-KVM process or execute arbitrary code with the privileges\nof the host's QEMU-KVM process (CVE-2016-0749).\n\nA memory access flaw was found in the way spice handled certain guests using\ncrafted primary surface parameters. A user in a guest could use this flaw to\nread from and write to arbitrary memory locations on the host (CVE-2016-2150).\n","modified":"2026-04-16T06:25:59.444790573Z","published":"2016-07-08T20:41:17Z","upstream":["CVE-2016-0749","CVE-2016-2150"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0250.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=18649"},{"type":"WEB","url":"https://rhn.redhat.com/errata/RHSA-2016-1205.html"}],"affected":[{"package":{"name":"spice","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/spice?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.12.5-2.3.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0250.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}