<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2026-0008</id>
    <title>An update for exempi is now available for HCE 2.0</title>
    <severity>Moderate</severity>
    <release>HCE 2.0</release>
    <issued date="2026-03-02 12:00:43"/>
    <updated date="2026-03-02 12:00:43"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-30309" id="CVE-2025-30309" title="CVE-2025-30309 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-30306" id="CVE-2025-30306" title="CVE-2025-30306 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-30307" id="CVE-2025-30307" title="CVE-2025-30307 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-30305" id="CVE-2025-30305" title="CVE-2025-30305 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-30308" id="CVE-2025-30308" title="CVE-2025-30308 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2025-30309)

XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2025-30306)

XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2025-30307)

XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2025-30305)

XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2025-30308)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="exempi">
        <name>HCE 2.0</name>
        <package arch="x86_64" name="exempi" version="2.5.2" release="2.r3.hce2">
          <filename>exempi-2.5.2-2.r3.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="exempi-devel" version="2.5.2" release="2.r3.hce2">
          <filename>exempi-devel-2.5.2-2.r3.hce2.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="exempi-help" version="2.5.2" release="2.r3.hce2">
          <filename>exempi-help-2.5.2-2.r3.hce2.noarch.rpm</filename>
        </package>
        <package arch="aarch64" name="exempi" version="2.5.2" release="2.r3.hce2">
          <filename>exempi-2.5.2-2.r3.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="exempi-devel" version="2.5.2" release="2.r3.hce2">
          <filename>exempi-devel-2.5.2-2.r3.hce2.aarch64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
