-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.0183
                         openjpeg2 security update
                              23 January 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           openjpeg2
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-9573 CVE-2016-9572 CVE-2016-8332
                   CVE-2016-5159  

Reference:         ESB-2017.0016
                   ASB-2016.0084
                   ESB-2016.2128

Original Bulletin: 
   http://www.debian.org/security/2017/dsa-3768

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3768-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 20, 2017                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : openjpeg2
CVE ID         : CVE-2016-5159 CVE-2016-8332 CVE-2016-9572 CVE-2016-9573

Multiple vulnerabilities in OpenJPEG, a JPEG 2000 image compression /
decompression library, may result in denial of service or the execution
of arbitrary code if a malformed JPEG 2000 file is processed.
		       
For the stable distribution (jessie), these problems have been fixed in
version 2.1.0-2+deb8u2.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your openjpeg2 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=iwEW
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=YUMq
-----END PGP SIGNATURE-----