-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.0861
                           jhead security update
                               3 April 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           jhead
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-3822  

Reference:         ASB-2016.0079
                   ESB-2016.1866

Original Bulletin: 
   http://www.debian.org/security/2017/dsa-3825

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3825-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
March 31, 2017                        https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : jhead
CVE ID         : CVE-2016-3822
Debian Bug     : 858213

It was discovered that jhead, a tool to manipulate the non-image part of
EXIF compliant JPEG files, is prone to an out-of-bounds access
vulnerability, which may result in denial of service or, potentially,
the execution of arbitrary code if an image with specially crafted EXIF
data is processed.

For the stable distribution (jessie), this problem has been fixed in
version 1:2.97-1+deb8u1.

For the upcoming stable distribution (stretch), this problem has been
fixed in version 1:3.00-4.

For the unstable distribution (sid), this problem has been fixed in
version 1:3.00-4.

We recommend that you upgrade your jhead packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=LkDv
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Bo9X
-----END PGP SIGNATURE-----