• [SECURITY] [DSA 5294-1] jhead security update

    From Markus Koschany@21:1/5 to All on Sun Dec 4 15:10:01 2022
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    - ------------------------------------------------------------------------- Debian Security Advisory DSA-5294-1 security@debian.org https://www.debian.org/security/ Markus Koschany December 04, 2022 https://www.debian.org/security/faq
    - -------------------------------------------------------------------------

    Package : jhead
    CVE ID : CVE-2021-34055 CVE-2022-41751
    Debian Bug : 1024272 1022028

    Jhead, a tool for manipulating EXIF data embedded in JPEG images, allowed attackers to execute arbitrary OS commands by placing them in a JPEG filename and then using the regeneration -rgt50, -autorot or -ce option. In addition a buffer overflow error in exif.c has been addressed which could lead to a denial of service (application crash).

    For the stable distribution (bullseye), these problems have been fixed in version 1:3.04-6+deb11u1.

    We recommend that you upgrade your jhead packages.

    For the detailed security status of jhead please refer to
    its security tracker page at:
    https://security-tracker.debian.org/tracker/jhead

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org
    -----BEGIN PGP SIGNATURE-----

    iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmOMon5fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeSPCw//RSHE4XffCzyilxKEqZkAqdwcr44zTz74Wo1IwGPzXe3L3Z0ySooSpxUf eZ87H9Gq8v1R0RWOcw71PTAUToxGZECOrTMUWjYzQBO8hMuM5gXf58HivnERe0Hd KwFZUxer0XzFBh76zeTWSGJ41L016SR+Gv8t+3m29VTZsS0AfAGAp5BBUYv8PEyt 1T9qLUfOFi7qbBUmxov1xKPL9lVLyXV5Vcr2zM8ZqvGxwQwtWyFlNGlNHgVbcqOq f9SRSOVHWi/kB3XrpmkdTTGtFfZO5yONrT0jCamQVuc0XF+XGslFsRbFLRaej7IC toElY4WvNd1HDKNmD74yWlzkc+XEMwxNv2pBW0xgIDJAdRKx+rk4tflB3q0nltj8 vefKh+FwHDmKqTkn7GqfXxrKGBl0EqzAj1IHRUaCjMaLi0QOaGHwOEQW1PzzyKZ+ rnOtlyLUHvYofoEHmjPycPM1SUFGkqL3gg82rRuIv3hNs/hoIl+dCBv6ETMDDe/j plii1vEoDXN3zfxinM6EF9zMsV5/lN/4hGFOMy+kZqdRNlqjlIIwFqg3FtsTkrCo EJJZsPlIg6YvJ/Bx7r2982uuE5LrpbvppWgVcWf9pj0X4UOf8H8xld99m0myVm3I G7KV7M1+iYTwZQNdxFyeg/so4Hs0A1s11Vi8JeUiqMDzfq0Fzuc=
    =1zd8
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)