Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: exiftool

Found 2 matching suggestions

View:
Compact
Detailed
Published
Permalink CVE-2026-7580
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 7 hours ago by @LeSuisse Activity log
Exiftool JPEG/QuickTime/MOV/MP4 GM.pm Process_mrld code injection

A vulnerability was detected in Exiftool up to 13.53. Impacted is the function Process_mrld of the file lib/Image/ExifTool/GM.pm of the component JPEG/QuickTime/MOV/MP4. The manipulation of the argument -ee results in code injection. Attacking locally is a requirement. Upgrading to version 13.54 is recommended to address this issue. The patch is identified as 5a8b6b6ead12b39e3f32f978a4efd0233facbb01. It is suggested to upgrade the affected component. The fix in the source code mentions: "[J]ust to be safe, probably never happen".

Affected products

Exiftool
  • ==13.52
  • ==13.36
  • ==13.35
  • ==13.34
  • ==13.48
  • ==13.42
  • ==13.33
  • ==13.19
  • ==13.38
  • ==13.45
  • ==13.39
  • ==13.46
  • ==13.30
  • ==13.0
  • ==13.37
  • ==13.14
  • ==13.43
  • ==13.51
  • ==13.29
  • ==13.25
  • ==13.54
  • ==13.18
  • ==13.16
  • ==13.3
  • ==13.21
  • ==13.12
  • ==13.13
  • ==13.11
  • ==13.9
  • ==13.24
  • ==13.28
  • ==13.6
  • ==13.26
  • ==13.32
  • ==13.4
  • ==13.15
  • ==13.17
  • ==13.50
  • ==13.31
  • ==13.44
  • ==13.49
  • ==13.23
  • ==13.7
  • ==13.40
  • ==13.20
  • ==13.2
  • ==13.22
  • ==13.10
  • ==13.8
  • ==13.5
  • ==13.53
  • ==13.27
  • ==13.41
  • ==13.47
  • ==13.1

Matching in nixpkgs

pkgs.exiftool

Tool to read, write and edit EXIF meta information

Ignored packages (7)

Package maintainers

Published
Permalink CVE-2026-3102
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 months ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    8 packages
    • haskellPackages.exiftool
    • perlPackages.ImageExifTool
    • perl5Packages.ImageExifTool
    • python312Packages.pyexiftool
    • python313Packages.pyexiftool
    • python314Packages.pyexiftool
    • perl538Packages.ImageExifTool
    • perl540Packages.ImageExifTool
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
exiftool PNG File MacOS.pm SetMacOSTags os command injection

A vulnerability was determined in exiftool up to 13.49 on macOS. This issue affects the function SetMacOSTags of the file lib/Image/ExifTool/MacOS.pm of the component PNG File Parser. This manipulation of the argument DateTimeOriginal causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 13.50 is capable of addressing this issue. Patch name: e9609a9bcc0d32bd252a709a562fb822d6dd86f7. Upgrading the affected component is recommended.

Affected products

exiftool
  • ==13.11
  • ==13.42
  • ==13.29
  • ==13.21
  • ==13.0
  • ==13.32
  • ==13.31
  • ==13.40
  • ==13.45
  • ==13.16
  • ==13.23
  • ==13.36
  • ==13.12
  • ==13.43
  • ==13.25
  • ==13.50
  • ==13.19
  • ==13.10
  • ==13.2
  • ==13.33
  • ==13.28
  • ==13.37
  • ==13.20
  • ==13.30
  • ==13.48
  • ==13.44
  • ==13.6
  • ==13.1
  • ==13.27
  • ==13.26
  • ==13.8
  • ==13.34
  • ==13.14
  • ==13.47
  • ==13.39
  • ==13.46
  • ==13.41
  • ==13.49
  • ==13.9
  • ==13.22
  • ==13.38
  • ==13.18
  • ==13.13
  • ==13.15
  • ==13.7
  • ==13.24
  • ==13.4
  • ==13.5
  • ==13.35
  • ==13.3
  • ==13.17

Matching in nixpkgs

pkgs.exiftool

Tool to read, write and edit EXIF meta information

Ignored packages (8)

Package maintainers

Upstream patch: https://github.com/exiftool/exiftool/commit/e9609a9bcc0d32bd252a709a562fb822d6dd86f7