DEBIAN-CVE-2021-36045

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2021-36045
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2021-36045.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2021-36045
Upstream
Published
2021-09-01T15:15:10Z
Modified
2025-09-19T07:31:41.482882Z
Summary
[none]
Details

XMP Toolkit SDK versions 2020.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

References

Affected packages

Debian:11 / exempi

Package

Name
exempi
Purl
pkg:deb/debian/exempi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.2-1+deb11u1

Affected versions

2.*

2.5.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / exempi

Package

Name
exempi
Purl
pkg:deb/debian/exempi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / exempi

Package

Name
exempi
Purl
pkg:deb/debian/exempi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / exempi

Package

Name
exempi
Purl
pkg:deb/debian/exempi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}