| Name | CVE-2026-27631 |
| Description | Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an uncaught exception was found in Exiv2. The vulnerability is in the preview component, which is only triggered when running Exiv2 with an extra command line argument, like -pp. Due to an integer overflow, the code attempts to create a huge std::vector, which causes Exiv2 to crash with an uncaught exception. This issue has been patched in version 0.28.8. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| exiv2 (PTS) | bullseye | 0.27.3-3+deb11u2 | vulnerable |
| bullseye (security) | 0.27.3-3+deb11u1 | vulnerable | |
| bookworm | 0.27.6-1 | vulnerable | |
| trixie | 0.28.5+dfsg-1 | vulnerable | |
| forky, sid | 0.28.7+dfsg-2 | vulnerable |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| exiv2 | source | (unstable) | (unfixed) |
https://github.com/Exiv2/exiv2/security/advisories/GHSA-p2pw-7935-c73j
https://github.com/Exiv2/exiv2/issues/3513
https://github.com/Exiv2/exiv2/pull/3514
Testcase: https://github.com/Exiv2/exiv2/commit/d728c55674914e313d5f19a0358af1fad519305a (v0.28.8)
Fixed by: https://github.com/Exiv2/exiv2/commit/21d129c842212c198dd887dbaafc5ce734e9dfad (v0.28.8)