Name | CVE-2021-36048 |
Description | XMP Toolkit SDK version 2020.1 (and earlier) is affected by an Improper Input Validation vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3585-1, ELA-758-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
exempi (PTS) | jessie | 2.2.1-2 | vulnerable |
| stretch (lts), stretch | 2.4.1-1+deb9u2 | fixed |
| buster (security), buster, buster (lts) | 2.5.0-2+deb10u1 | fixed |
| bullseye | 2.5.2-1 | vulnerable |
| bookworm | 2.6.3-1 | fixed |
| sid, trixie | 2.6.5-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[bullseye] - exempi <no-dsa> (Minor issue)
https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html
https://cgit.freedesktop.org/exempi/commit/?h=2.6.0&id=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48
https://gitlab.freedesktop.org/libopenraw/exempi/-/releases