This is an automatically created tracking bug! It was created to ensure that one or more security vulnerabilities are fixed in affected versions of fedora-all. For comments that are specific to the vulnerability please use bugs filed against the "Security Response" product referenced in the "Blocks" field. For more information see: http://fedoraproject.org/wiki/Security/TrackingBugs When submitting as an update, use the fedpkg template provided in the next comment(s). This will include the bug IDs of this tracking bug as well as the relevant top-level CVE bugs. Please also mention the CVE IDs being fixed in the RPM changelog and the fedpkg commit message. NOTE: this issue affects multiple supported versions of Fedora. While only one tracking bug has been filed, please correct all affected versions at the same time. If you need to fix the versions independent of each other, you may clone this bug as appropriate.
Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associated bugs get updated when new packages are pushed to stable. ===== # bugfix, security, enhancement, newpackage (required) type=security # low, medium, high, urgent (required) severity=high # testing, stable request=testing # Bug numbers: 1234,9876 bugs=2052012,2052014 # Description of your update notes=Security fix for [PUT CVEs HERE] # Enable request automation based on the stable/unstable karma thresholds autokarma=True stable_karma=3 unstable_karma=-3 # Automatically close bugs when this marked as stable close_bugs=True # Suggest that users restart after update suggest_reboot=False ====== Additionally, you may opt to use the bodhi web interface to submit updates: https://bodhi.fedoraproject.org/updates/new
https://nvd.nist.gov/vuln/detail/CVE-2022-0546 https://developer.blender.org/T94572 Based on upstream git, the fix is included in 3.1.0 and later releases (F35, F36, F37), but NOT in 2.93.8 final (F34). > commit 77616082f44da5258faf9ec0d53618c721b88c62 > Author: Jesse Yurkovich <jesse.y> > Date: Tue Jan 11 20:48:32 2022 -0800 > > Fix T89542: Crash when loading certain .hdr files > > The direct cause of the bug in question was passing in the raw memory > buffer to sscanf. It should be called with a null-terminated buffer; > which isn't guaranteed when blindly trusting the file data. > > When attempting to fuzz this code path, a variety of other crashes were > discovered and fixed. > > Differential Revision: https://developer.blender.org/D11952 I have therefore set the Version to 34, since that appears to be the only affected current Fedora release.
Sorry, I mixed this up with bug 2052010 for CVE-2022-0546. Corrected analysis is below. https://nvd.nist.gov/vuln/detail/CVE-2022-0545 https://developer.blender.org/T94629 Based on upstream git, the fix is included in 3.1.0 and later releases (F35, F36, F37), and in 2.93.8 final (F34), so it appears that this is already resolved in current Fedora releases. > commit e07f16776bca5e9494e6b143170f31d5eeb160ce > Author: Jesse Yurkovich <jesse.y> > Date: Thu Jan 6 21:35:04 2022 -0800 > > Fix T94629: The IMB_flip API would fail with large images > > Fix IMB_flip[xy] to handle cases where integer overflow might occur when > given sufficiently large image dimensions. > > All of these fixes were of a similar class where the intermediate > sub-expression would overflow silently. Widen the types as necessary. > > Differential Revision: https://developer.blender.org/D13744