CVE-2026-27631

NameCVE-2026-27631
DescriptionExiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an uncaught exception was found in Exiv2. The vulnerability is in the preview component, which is only triggered when running Exiv2 with an extra command line argument, like -pp. Due to an integer overflow, the code attempts to create a huge std::vector, which causes Exiv2 to crash with an uncaught exception. This issue has been patched in version 0.28.8.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
exiv2 (PTS)bullseye0.27.3-3+deb11u2vulnerable
bullseye (security)0.27.3-3+deb11u1vulnerable
bookworm0.27.6-1vulnerable
trixie0.28.5+dfsg-1vulnerable
forky, sid0.28.7+dfsg-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
exiv2source(unstable)(unfixed)

Notes

https://github.com/Exiv2/exiv2/security/advisories/GHSA-p2pw-7935-c73j
https://github.com/Exiv2/exiv2/issues/3513
https://github.com/Exiv2/exiv2/pull/3514
Testcase: https://github.com/Exiv2/exiv2/commit/d728c55674914e313d5f19a0358af1fad519305a (v0.28.8)
Fixed by: https://github.com/Exiv2/exiv2/commit/21d129c842212c198dd887dbaafc5ce734e9dfad (v0.28.8)

Search for package or bug name: Reporting problems