The following Debian updates has been released:
[DLA 822-1] vim security update
[DSA 3786-1] vim security update
[DSA 3787-1] tomcat7 security update
[DSA 3788-1] tomcat8 security update
[DLA 822-1] vim security update
[DSA 3786-1] vim security update
[DSA 3787-1] tomcat7 security update
[DSA 3788-1] tomcat8 security update
[DLA 822-1] vim security update
Package : vim
Version : 2:7.3.547-7+deb7u2
CVE ID : CVE-2017-5953
Debian Bug : #854969
A vulnerability has been discovered in Vim where a malformed spell file
could cause an integer overflow which is used as the size for memory
allocation, resulting in a subsequent buffer overflow.
For Debian 7 "Wheezy", these problems have been fixed in version
2:7.3.547-7+deb7u2.
We recommend that you upgrade your vim packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DSA 3786-1] vim security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3786-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 13, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : vim
CVE ID : CVE-2017-5953
Debian Bug : 854969
Editor spell files passed to the vim (Vi IMproved) editor
may result in an integer overflow in memory allocation
and a resulting buffer overflow which potentially
could result in the execution of arbitrary code or denial of
service.
For the stable distribution (jessie), this problem has been
fixed in version 2:7.4.488-7+deb8u2.
For the unstable distribution (sid), this problem has been
fixed in version 2:8.0.0197-2.
We recommend that you upgrade your vim packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[DSA 3787-1] tomcat7 security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3787-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 13, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : tomcat7
CVE ID : not yet available
Debian Bug : 851304
It was discovered that a programming error in the processing of HTTPS
requests in the Apache Tomcat servlet and JSP engine may result in
denial of service via an infinite loop.
For the stable distribution (jessie), this problem has been fixed in
version 7.0.56-3+deb8u8.
We recommend that you upgrade your tomcat7 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[DSA 3788-1] tomcat8 security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3788-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 13, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : tomcat8
CVE ID : not yet available
Debian Bug : 851304
It was discovered that a programming error in the processing of HTTPS
requests in the Apache Tomcat servlet and JSP engine may result in
denial of service via an infinite loop.
For the stable distribution (jessie), this problem has been fixed in
version 8.0.14-1+deb8u7.
For the unstable distribution (sid), this problem will be fixed soon.
We recommend that you upgrade your tomcat8 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/