Name | CVE-2021-36045 |
Description | XMP Toolkit SDK versions 2020.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3585-1, ELA-758-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
exempi (PTS) | jessie | 2.2.1-2 | vulnerable |
| stretch (lts), stretch | 2.4.1-1+deb9u2 | fixed |
| buster (security), buster, buster (lts) | 2.5.0-2+deb10u1 | fixed |
| bullseye | 2.5.2-1 | vulnerable |
| bookworm | 2.6.3-1 | fixed |
| sid, trixie | 2.6.5-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[bullseye] - exempi <no-dsa> (Minor issue)
https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html
https://cgit.freedesktop.org/exempi/commit/?h=2.6.0&id=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48
https://gitlab.freedesktop.org/libopenraw/exempi/-/releases