<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">exiv2-0.28.8-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2026:10298-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-03-07T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-03-07T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-03-07T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">exiv2-0.28.8-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the exiv2-0.28.8-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2026-10298</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-26623/</URL>
      <Description>SUSE CVE CVE-2025-26623 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-54080/</URL>
      <Description>SUSE CVE CVE-2025-54080 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-55304/</URL>
      <Description>SUSE CVE CVE-2025-55304 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-25884/</URL>
      <Description>SUSE CVE CVE-2026-25884 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-27631/</URL>
      <Description>SUSE CVE CVE-2026-27631 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="exiv2-0.28.8-1.1">
      <FullProductName ProductID="exiv2-0.28.8-1.1">exiv2-0.28.8-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="exiv2-lang-0.28.8-1.1">
      <FullProductName ProductID="exiv2-lang-0.28.8-1.1">exiv2-lang-0.28.8-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libexiv2-28-0.28.8-1.1">
      <FullProductName ProductID="libexiv2-28-0.28.8-1.1">libexiv2-28-0.28.8-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libexiv2-28-x86-64-v3-0.28.8-1.1">
      <FullProductName ProductID="libexiv2-28-x86-64-v3-0.28.8-1.1">libexiv2-28-x86-64-v3-0.28.8-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libexiv2-devel-0.28.8-1.1">
      <FullProductName ProductID="libexiv2-devel-0.28.8-1.1">libexiv2-devel-0.28.8-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="exiv2-0.28.8-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:exiv2-0.28.8-1.1">exiv2-0.28.8-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="exiv2-lang-0.28.8-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:exiv2-lang-0.28.8-1.1">exiv2-lang-0.28.8-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libexiv2-28-0.28.8-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libexiv2-28-0.28.8-1.1">libexiv2-28-0.28.8-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libexiv2-28-x86-64-v3-0.28.8-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libexiv2-28-x86-64-v3-0.28.8-1.1">libexiv2-28-x86-64-v3-0.28.8-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libexiv2-devel-0.28.8-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libexiv2-devel-0.28.8-1.1">libexiv2-devel-0.28.8-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. A heap buffer overflow was found in Exiv2 versions v0.28.0 to v0.28.4. Versions prior to v0.28.0, such as v0.27.7, are **not** affected. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `fixiso`. The bug is fixed in version v0.28.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.</Note>
    </Notes>
    <CVE>CVE-2025-26623</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:exiv2-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:exiv2-lang-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-28-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-28-x86-64-v3-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-devel-0.28.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-26623.html</URL>
        <Description>CVE-2025-26623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1237347</URL>
        <Description>SUSE Bug 1237347</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions 0.28.5 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. The bug is fixed in version 0.28.6.</Note>
    </Notes>
    <CVE>CVE-2025-54080</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:exiv2-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:exiv2-lang-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-28-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-28-x86-64-v3-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-devel-0.28.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-54080.html</URL>
        <Description>CVE-2025-54080</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248962</URL>
        <Description>SUSE Bug 1248962</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. A denial-of-service was found in Exiv2 version 0.28.5: a quadratic algorithm in the ICC profile parsing code in jpegBase::readMetadata() can cause Exiv2 to run for a long time. The denial-of-service is triggered when Exiv2 is used to read the metadata of a crafted jpg image file. The bug is fixed in version 0.28.6.</Note>
    </Notes>
    <CVE>CVE-2025-55304</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:exiv2-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:exiv2-lang-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-28-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-28-x86-64-v3-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-devel-0.28.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-55304.html</URL>
        <Description>CVE-2025-55304</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248963</URL>
        <Description>SUSE Bug 1248963</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an out-of-bounds read was found. The vulnerability is in the CRW image parser. This issue has been patched in version 0.28.8.</Note>
    </Notes>
    <CVE>CVE-2026-25884</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:exiv2-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:exiv2-lang-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-28-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-28-x86-64-v3-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-devel-0.28.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-25884.html</URL>
        <Description>CVE-2026-25884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259083</URL>
        <Description>SUSE Bug 1259083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an uncaught exception was found in Exiv2. The vulnerability is in the preview component, which is only triggered when running Exiv2 with an extra command line argument, like -pp. Due to an integer overflow, the code attempts to create a huge std::vector, which causes Exiv2 to crash with an uncaught exception. This issue has been patched in version 0.28.8.</Note>
    </Notes>
    <CVE>CVE-2026-27631</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:exiv2-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:exiv2-lang-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-28-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-28-x86-64-v3-0.28.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-devel-0.28.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-27631.html</URL>
        <Description>CVE-2026-27631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259085</URL>
        <Description>SUSE Bug 1259085</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
