摘要:
exempi security update
安全等级: Medium
公告ID: KylinSec-SA-2025-2876
发布日期: 2025年9月15日
关联CVE: CVE-2025-30309 CVE-2025-30308 CVE-2025-30305 CVE-2025-30307 CVE-2025-30306
Exempi is an implementation of XMP. Version 2.x is based on Adobe XMP SDK and released under a BSD-style license like Adobe's.
Security Fix(es):
XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.(CVE-2025-30305)
XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.(CVE-2025-30306)
XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.(CVE-2025-30307)
XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.(CVE-2025-30308)
XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.(CVE-2025-30309)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2025-30309 | KY3.4-5A | exempi | Fixed |
CVE-2025-30308 | KY3.4-5A | exempi | Fixed |
CVE-2025-30305 | KY3.4-5A | exempi | Fixed |
CVE-2025-30307 | KY3.4-5A | exempi | Fixed |
CVE-2025-30306 | KY3.4-5A | exempi | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
exempi-help | noarch | 2.4.5-6.kb1.ky3_4 |
exempi | x86_64 | 2.4.5-6.kb1.ky3_4 |
exempi-devel | x86_64 | 2.4.5-6.kb1.ky3_4 |
exempi | aarch64 | 2.4.5-6.kb1.ky3_4 |
exempi-devel | aarch64 | 2.4.5-6.kb1.ky3_4 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名