Red Hat Bugzilla – Bug 851773
CVE-2009-3850 Blender: Arbitrary code execution via malicious .blend file [epel-all]
Last modified: 2016-11-21 14:01:35 EST
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected Fedora
For comments that are specific to the vulnerability please use bugs filed
against "Security Response" product referenced in the "Blocks" field.
For more information see:
When creating a Bodhi update request, please include this bug ID and the
bug IDs of this bug's parent bugs filed against the "Security Response"
product (the top-level CVE bugs). Please mention the CVE IDs being fixed
in the RPM changelog when available.
Bodhi update submission link:
Please note: this issue affects multiple supported versions of Fedora EPEL.
Only one tracking bug has been filed; please ensure that it is only closed
when all affected versions are fixed.
[bug automatically created by: add-tracking-bugs]
The upstream has been fixed for quite long,
Could you please take a look at it?
Hello Jochen, you plan to fix it?
I am the new maintainer of Blender and notice this bug report. Sadly, the new version requires python 3.5.1. Given my lack of experience in EPEL would someone maintain this branch?
This was fixed in Fedora 16 via:
Surely that version doesn't require python 3.5.1 (pretty sure Fedora 16 did not have python3). Can't you just update to that version?
I mean, this bug is over 4 years old now so maybe not fixing it is ok at this point given it's age?
(In reply to Vincent Danen from comment #4)
> This was fixed in Fedora 16 via:
> Surely that version doesn't require python 3.5.1 (pretty sure Fedora 16 did
> not have python3). Can't you just update to that version?
> I mean, this bug is over 4 years old now so maybe not fixing it is ok at
> this point given it's age?
I agree. Looking at the database, Blender is retired on both el5 and el6. However, epel7 branch is still active and needs a build.
With those considerations I can safely close this report.