The following updates has been released for Debian 7 LTS:
[DLA 531-1] spice security update
[DLA 532-1] movabletype-opensource security update
[DLA 531-1] spice security update
[DLA 532-1] movabletype-opensource security update
[DLA 531-1] spice security update
Package : spice
Version : 0.11.0-1+deb7u3
CVE ID : CVE-2016-2150
Debian Bug : 826584
A vulnerability has been found in the Simple Protocol for Independent Computing
Environments, SPICE.
Frediano Ziglio from Red Hat discovered that SPICE allowed local guest
OS users to read from or write to arbitrary host memory locations via
crafted primary surface parameters.
For Debian 7 "Wheezy", this problem has been fixed in version 0.11.0-1+deb7u3.
We recommend you to upgrade your spice packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DLA 532-1] movabletype-opensource security update
Package : movabletype-opensource
Version : 5.1.4+dfsg-4+deb7u4
CVE ID : CVE-2016-5742
It was discovered that there was a SQL injection vulnerability in
the XML-RPC interface in MovableType, a blogging engine.
For Debian 7 "Wheezy", this issue has been fixed in
movabletype-opensource version 5.1.4+dfsg-4+deb7u4.
We recommend that you upgrade your movabletype-opensource packages.