{"schema_version":"1.7.2","id":"OESA-2025-2293","modified":"2025-09-12T14:26:29Z","published":"2025-09-12T14:26:29Z","upstream":["CVE-2025-30305","CVE-2025-30306","CVE-2025-30307","CVE-2025-30308","CVE-2025-30309"],"summary":"exempi security update","details":"Exempi is an implementation of XMP. Version 2.x is based on Adobe XMP SDK and released under a BSD-style license like Adobe&amp;apos;s.\r\n\r\nSecurity Fix(es):\n\nXMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.(CVE-2025-30305)\n\nXMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.(CVE-2025-30306)\n\nXMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.(CVE-2025-30307)\n\nXMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.(CVE-2025-30308)\n\nXMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.(CVE-2025-30309)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"exempi","purl":"pkg:rpm/openEuler/exempi&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.6.4-2.oe2403"}]}],"ecosystem_specific":{"aarch64":["exempi-2.6.4-2.oe2403.aarch64.rpm","exempi-debuginfo-2.6.4-2.oe2403.aarch64.rpm","exempi-debugsource-2.6.4-2.oe2403.aarch64.rpm","exempi-devel-2.6.4-2.oe2403.aarch64.rpm"],"noarch":["exempi-help-2.6.4-2.oe2403.noarch.rpm"],"src":["exempi-2.6.4-2.oe2403.src.rpm"],"x86_64":["exempi-2.6.4-2.oe2403.x86_64.rpm","exempi-debuginfo-2.6.4-2.oe2403.x86_64.rpm","exempi-debugsource-2.6.4-2.oe2403.x86_64.rpm","exempi-devel-2.6.4-2.oe2403.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2293"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-30305"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-30306"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-30307"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-30308"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-30309"}],"database_specific":{"severity":"Medium"}}
