openSUSE-SU-2018:2827-1: moderate: Security update for jhead

openSUSE Security Update: Security update for jhead

Announcement ID: openSUSE-SU-2018:2827-1
Rating: moderate
References: #1108480
Cross-References: CVE-2016-3822 CVE-2018-16554
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
openSUSE Backports SLE-15

An update that fixes two vulnerabilities is now available.


This update for jhead fixes the following security issues:

– CVE-2016-3822: jhead remote attackers to execute arbitrary code or cause
a denial of service (out-of-bounds access) via crafted EXIF data
– CVE-2018-16554: The ProcessGpsInfo function may have allowed a remote
attacker to cause a denial-of-service attack or unspecified other impact
via a malicious JPEG file, because of inconsistency between float and
double in a sprintf format string during TAG_GPS_ALT handling

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1044=1

– openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1044=1

– openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2018-1044=1

Package List:

– openSUSE Leap 42.3 (i586 x86_64):


– openSUSE Leap 15.0 (x86_64):


– openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):



To unsubscribe, e-mail:
For additional commands, e-mail: