Bug 2052012 (CVE-2022-0545)
Summary: | CVE-2022-0545 blender: Out-of-bounds memory access in IMB_flipy() due to large image dimensions | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Mauro Matteo Cascella <mcascell> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED UPSTREAM | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | design-devel, kwizart, luya_tfz, negativo17, promac |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | blender 2.83.19, blender 2.93.8, blender 3.1 | Doc Type: | If docs needed, set a value |
Doc Text: |
An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-02-08 15:13:03 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2052013, 2052014 | ||
Bug Blocks: | 2052005, 2052113 |
Description
Mauro Matteo Cascella
2022-02-08 14:13:58 UTC
Created blender tracking bugs for this issue: Affects: epel-all [bug 2052013] Affects: fedora-all [bug 2052014] This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products. Similar flaws were found and reported by Cisco Talos in 2017. For more information, see https://developer.blender.org/T52924 and https://blog.talosintelligence.com/2018/01/unpatched-blender-vulns.html. |