Bug 2052012 (CVE-2022-0545) - CVE-2022-0545 blender: Out-of-bounds memory access in IMB_flipy() due to large image dimensions
Summary: CVE-2022-0545 blender: Out-of-bounds memory access in IMB_flipy() due to larg...
Keywords:
Status: CLOSED UPSTREAM
Alias: CVE-2022-0545
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2052013 2052014
Blocks: 2052005 2052113
TreeView+ depends on / blocked
 
Reported: 2022-02-08 14:13 UTC by Mauro Matteo Cascella
Modified: 2022-02-22 14:16 UTC (History)
5 users (show)

Fixed In Version: blender 2.83.19, blender 2.93.8, blender 3.1
Clone Of:
Environment:
Last Closed: 2022-02-08 15:13:03 UTC
Embargoed:


Attachments (Terms of Use)

Description Mauro Matteo Cascella 2022-02-08 14:13:58 UTC
An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded.

Upstream issue:
https://developer.blender.org/T94629

Upstream patch:
https://developer.blender.org/D13744

Comment 1 Mauro Matteo Cascella 2022-02-08 14:14:16 UTC
Created blender tracking bugs for this issue:

Affects: epel-all [bug 2052013]
Affects: fedora-all [bug 2052014]

Comment 3 Product Security DevOps Team 2022-02-08 15:13:01 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.

Comment 4 Mauro Matteo Cascella 2022-02-08 15:35:33 UTC
Similar flaws were found and reported by Cisco Talos in 2017. For more information, see https://developer.blender.org/T52924 and https://blog.talosintelligence.com/2018/01/unpatched-blender-vulns.html.


Note You need to log in before you can comment on or make changes to this bug.