{"schema_version":"1.7.2","id":"OESA-2026-2224","modified":"2026-05-09T12:31:16Z","published":"2026-05-09T12:31:16Z","upstream":["CVE-2026-7580"],"summary":"perl-Image-ExifTool security update","details":"ExifTool is a Perl module with an included command-line application for reading and writing meta information in image, audio, and video files. It reads EXIF, GPS, IPTC, XMP, JFIF, MakerNotes, GeoTIFF, ICC Profile, Photoshop IRB, FlashPix, AFCP, and ID3 meta information from JPG, JP2, TIFF, GIF, PNG, MNG, JNG, MIFF, EPS, PS, AI, PDF, PSD, BMP, THM, CRW, CR2, MRW, NEF, PEF, ORF, DNG, and many other types of images. ExifTool also extracts information from the maker notes of many digital cameras by various manufacturers including Canon, Casio, FujiFilm, GE, HP, JVC/Victor, Kodak, Leaf, Minolta/Konica-Minolta, Nikon, Olympus/Epson, Panasonic/Leica, Pentax/Asahi, Reconyx, Ricoh, Samsung, Sanyo, Sigma/Foveon, and Sony.\r\n\r\nSecurity Fix(es):\n\nA vulnerability was detected in Exiftool up to 13.53. Impacted is the function Process_mrld of the file lib/Image/ExifTool/GM.pm of the component JPEG/QuickTime/MOV/MP4. The manipulation of the argument -ee results in code injection. Attacking locally is a requirement. Upgrading to version 13.54 is recommended to address this issue. The patch is identified as 5a8b6b6ead12b39e3f32f978a4efd0233facbb01. It is suggested to upgrade the affected component. The fix in the source code mentions: &quot;[J]ust to be safe, probably never happen&quot;.(CVE-2026-7580)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"perl-Image-ExifTool","purl":"pkg:rpm/openEuler/perl-Image-ExifTool&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"13.55-1.oe2403sp3"}]}],"ecosystem_specific":{"noarch":["perl-Image-ExifTool-13.55-1.oe2403sp3.noarch.rpm"],"src":["perl-Image-ExifTool-13.55-1.oe2403sp3.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2224"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-7580"}],"database_specific":{"severity":"Medium"}}
