DEBIAN-CVE-2021-36057

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2021-36057
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2021-36057.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2021-36057
Upstream
Published
2021-09-01T15:15:11Z
Modified
2025-09-19T07:31:41.558013Z
Summary
[none]
Details

XMP Toolkit SDK version 2020.1 (and earlier) is affected by a write-what-where condition vulnerability caused during the application's memory allocation process. This may cause the memory management functions to become mismatched resulting in local application denial of service in the context of the current user.

References

Affected packages

Debian:11 / exempi

Package

Name
exempi
Purl
pkg:deb/debian/exempi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.2-1+deb11u1

Affected versions

2.*

2.5.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / exempi

Package

Name
exempi
Purl
pkg:deb/debian/exempi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / exempi

Package

Name
exempi
Purl
pkg:deb/debian/exempi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / exempi

Package

Name
exempi
Purl
pkg:deb/debian/exempi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}