Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-0545 (GCVE-0-2022-0545)
Vulnerability from cvelistv5 – Published: 2022-02-24 18:27 – Updated: 2024-08-02 23:32
VLAI?
EPSS
Summary
An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.
Severity ?
No CVSS data available.
CWE
- CWE-190 - >CWE-787
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T23:32:46.403Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://developer.blender.org/T94629"
},
{
"name": "[debian-lts-announce] 20220628 [SECURITY] [DLA 3060-1] blender security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html"
},
{
"name": "DSA-5176",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2022/dsa-5176"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Blender",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Blender versions prior to 2.83.19, 2.93.8 and 3.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-190",
"description": "CWE-190-\u003eCWE-787",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-07-05T10:06:12.000Z",
"orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"shortName": "fedora"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://developer.blender.org/T94629"
},
{
"name": "[debian-lts-announce] 20220628 [SECURITY] [DLA 3060-1] blender security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html"
},
{
"name": "DSA-5176",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2022/dsa-5176"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "patrick@puiterwijk.org",
"ID": "CVE-2022-0545",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Blender",
"version": {
"version_data": [
{
"version_value": "Blender versions prior to 2.83.19, 2.93.8 and 3.1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-190-\u003eCWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://developer.blender.org/T94629",
"refsource": "MISC",
"url": "https://developer.blender.org/T94629"
},
{
"name": "[debian-lts-announce] 20220628 [SECURITY] [DLA 3060-1] blender security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html"
},
{
"name": "DSA-5176",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2022/dsa-5176"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"assignerShortName": "fedora",
"cveId": "CVE-2022-0545",
"datePublished": "2022-02-24T18:27:16.000Z",
"dateReserved": "2022-02-08T00:00:00.000Z",
"dateUpdated": "2024-08-02T23:32:46.403Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.83.19\", \"matchCriteriaId\": \"991AC87F-A637-42E2-ADDE-CAFBBD158A8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.90.0\", \"versionEndExcluding\": \"2.93.8\", \"matchCriteriaId\": \"A9A6568C-F50D-4D37-B285-D75AB53362BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.0.0\", \"versionEndExcluding\": \"3.1.0\", \"matchCriteriaId\": \"677B439D-E7C7-4BFF-92A1-869746B9A2B0\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.\"}, {\"lang\": \"es\", \"value\": \"Un desbordamiento de enteros en el procesamiento de im\\u00e1genes 2D cargadas conlleva a una vulnerabilidad de escritura y lectura fuera de l\\u00edmites, permitiendo a un atacante filtrar informaci\\u00f3n confidencial o lograr una ejecuci\\u00f3n de c\\u00f3digo en el contexto del proceso de Blender cuando es cargado un archivo de imagen especialmente dise\\u00f1ado. Este fallo afecta a Blender versiones anteriores a la 2.83.19, 2.93.8 y 3.1\"}]",
"id": "CVE-2022-0545",
"lastModified": "2024-11-21T06:38:53.133",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:N/C:P/I:P/A:P\", \"baseScore\": 5.1, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 4.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2022-02-24T19:15:09.760",
"references": "[{\"url\": \"https://developer.blender.org/T94629\", \"source\": \"patrick@puiterwijk.org\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html\", \"source\": \"patrick@puiterwijk.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2022/dsa-5176\", \"source\": \"patrick@puiterwijk.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://developer.blender.org/T94629\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2022/dsa-5176\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "patrick@puiterwijk.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"patrick@puiterwijk.org\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-190\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-190\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-0545\",\"sourceIdentifier\":\"patrick@puiterwijk.org\",\"published\":\"2022-02-24T19:15:09.760\",\"lastModified\":\"2024-11-21T06:38:53.133\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de enteros en el procesamiento de im\u00e1genes 2D cargadas conlleva a una vulnerabilidad de escritura y lectura fuera de l\u00edmites, permitiendo a un atacante filtrar informaci\u00f3n confidencial o lograr una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso de Blender cuando es cargado un archivo de imagen especialmente dise\u00f1ado. Este fallo afecta a Blender versiones anteriores a la 2.83.19, 2.93.8 y 3.1\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":5.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"patrick@puiterwijk.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.83.19\",\"matchCriteriaId\":\"991AC87F-A637-42E2-ADDE-CAFBBD158A8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.90.0\",\"versionEndExcluding\":\"2.93.8\",\"matchCriteriaId\":\"A9A6568C-F50D-4D37-B285-D75AB53362BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndExcluding\":\"3.1.0\",\"matchCriteriaId\":\"677B439D-E7C7-4BFF-92A1-869746B9A2B0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}],\"references\":[{\"url\":\"https://developer.blender.org/T94629\",\"source\":\"patrick@puiterwijk.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html\",\"source\":\"patrick@puiterwijk.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5176\",\"source\":\"patrick@puiterwijk.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://developer.blender.org/T94629\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
FKIE_CVE-2022-0545
Vulnerability from fkie_nvd - Published: 2022-02-24 19:15 - Updated: 2024-11-21 06:38
Severity ?
Summary
An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.
References
| URL | Tags | ||
|---|---|---|---|
| patrick@puiterwijk.org | https://developer.blender.org/T94629 | Issue Tracking, Patch, Vendor Advisory | |
| patrick@puiterwijk.org | https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html | Mailing List, Third Party Advisory | |
| patrick@puiterwijk.org | https://www.debian.org/security/2022/dsa-5176 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://developer.blender.org/T94629 | Issue Tracking, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5176 | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| blender | blender | * | |
| blender | blender | * | |
| blender | blender | * | |
| debian | debian_linux | 10.0 | |
| debian | debian_linux | 11.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "991AC87F-A637-42E2-ADDE-CAFBBD158A8A",
"versionEndExcluding": "2.83.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A9A6568C-F50D-4D37-B285-D75AB53362BE",
"versionEndExcluding": "2.93.8",
"versionStartIncluding": "2.90.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "677B439D-E7C7-4BFF-92A1-869746B9A2B0",
"versionEndExcluding": "3.1.0",
"versionStartIncluding": "3.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1."
},
{
"lang": "es",
"value": "Un desbordamiento de enteros en el procesamiento de im\u00e1genes 2D cargadas conlleva a una vulnerabilidad de escritura y lectura fuera de l\u00edmites, permitiendo a un atacante filtrar informaci\u00f3n confidencial o lograr una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso de Blender cuando es cargado un archivo de imagen especialmente dise\u00f1ado. Este fallo afecta a Blender versiones anteriores a la 2.83.19, 2.93.8 y 3.1"
}
],
"id": "CVE-2022-0545",
"lastModified": "2024-11-21T06:38:53.133",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-02-24T19:15:09.760",
"references": [
{
"source": "patrick@puiterwijk.org",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://developer.blender.org/T94629"
},
{
"source": "patrick@puiterwijk.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html"
},
{
"source": "patrick@puiterwijk.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5176"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://developer.blender.org/T94629"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5176"
}
],
"sourceIdentifier": "patrick@puiterwijk.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "patrick@puiterwijk.org",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
OPENSUSE-SU-2024:11859-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
blender-3.0.1-2.1 on GA media
Severity
Moderate
Notes
Title of the patch: blender-3.0.1-2.1 on GA media
Description of the patch: These are all security issues fixed in the blender-3.0.1-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-11859
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "blender-3.0.1-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the blender-3.0.1-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11859",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11859-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0544 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0546 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0546/"
}
],
"title": "blender-3.0.1-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11859-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "blender-3.0.1-2.1.aarch64",
"product": {
"name": "blender-3.0.1-2.1.aarch64",
"product_id": "blender-3.0.1-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "blender-cycles-devel-3.0.1-2.1.aarch64",
"product": {
"name": "blender-cycles-devel-3.0.1-2.1.aarch64",
"product_id": "blender-cycles-devel-3.0.1-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "blender-demo-3.0.1-2.1.aarch64",
"product": {
"name": "blender-demo-3.0.1-2.1.aarch64",
"product_id": "blender-demo-3.0.1-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "blender-lang-3.0.1-2.1.aarch64",
"product": {
"name": "blender-lang-3.0.1-2.1.aarch64",
"product_id": "blender-lang-3.0.1-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-3.0.1-2.1.ppc64le",
"product": {
"name": "blender-3.0.1-2.1.ppc64le",
"product_id": "blender-3.0.1-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "blender-cycles-devel-3.0.1-2.1.ppc64le",
"product": {
"name": "blender-cycles-devel-3.0.1-2.1.ppc64le",
"product_id": "blender-cycles-devel-3.0.1-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "blender-demo-3.0.1-2.1.ppc64le",
"product": {
"name": "blender-demo-3.0.1-2.1.ppc64le",
"product_id": "blender-demo-3.0.1-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "blender-lang-3.0.1-2.1.ppc64le",
"product": {
"name": "blender-lang-3.0.1-2.1.ppc64le",
"product_id": "blender-lang-3.0.1-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-3.0.1-2.1.s390x",
"product": {
"name": "blender-3.0.1-2.1.s390x",
"product_id": "blender-3.0.1-2.1.s390x"
}
},
{
"category": "product_version",
"name": "blender-cycles-devel-3.0.1-2.1.s390x",
"product": {
"name": "blender-cycles-devel-3.0.1-2.1.s390x",
"product_id": "blender-cycles-devel-3.0.1-2.1.s390x"
}
},
{
"category": "product_version",
"name": "blender-demo-3.0.1-2.1.s390x",
"product": {
"name": "blender-demo-3.0.1-2.1.s390x",
"product_id": "blender-demo-3.0.1-2.1.s390x"
}
},
{
"category": "product_version",
"name": "blender-lang-3.0.1-2.1.s390x",
"product": {
"name": "blender-lang-3.0.1-2.1.s390x",
"product_id": "blender-lang-3.0.1-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-3.0.1-2.1.x86_64",
"product": {
"name": "blender-3.0.1-2.1.x86_64",
"product_id": "blender-3.0.1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "blender-cycles-devel-3.0.1-2.1.x86_64",
"product": {
"name": "blender-cycles-devel-3.0.1-2.1.x86_64",
"product_id": "blender-cycles-devel-3.0.1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "blender-demo-3.0.1-2.1.x86_64",
"product": {
"name": "blender-demo-3.0.1-2.1.x86_64",
"product_id": "blender-demo-3.0.1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "blender-lang-3.0.1-2.1.x86_64",
"product": {
"name": "blender-lang-3.0.1-2.1.x86_64",
"product_id": "blender-lang-3.0.1-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-3.0.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64"
},
"product_reference": "blender-3.0.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-3.0.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le"
},
"product_reference": "blender-3.0.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-3.0.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-3.0.1-2.1.s390x"
},
"product_reference": "blender-3.0.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-3.0.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64"
},
"product_reference": "blender-3.0.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-cycles-devel-3.0.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64"
},
"product_reference": "blender-cycles-devel-3.0.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-cycles-devel-3.0.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le"
},
"product_reference": "blender-cycles-devel-3.0.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-cycles-devel-3.0.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x"
},
"product_reference": "blender-cycles-devel-3.0.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-cycles-devel-3.0.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64"
},
"product_reference": "blender-cycles-devel-3.0.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-demo-3.0.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64"
},
"product_reference": "blender-demo-3.0.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-demo-3.0.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le"
},
"product_reference": "blender-demo-3.0.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-demo-3.0.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x"
},
"product_reference": "blender-demo-3.0.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-demo-3.0.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64"
},
"product_reference": "blender-demo-3.0.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-lang-3.0.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64"
},
"product_reference": "blender-lang-3.0.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-lang-3.0.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le"
},
"product_reference": "blender-lang-3.0.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-lang-3.0.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x"
},
"product_reference": "blender-lang-3.0.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-lang-3.0.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
},
"product_reference": "blender-lang-3.0.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-0544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0544"
}
],
"notes": [
{
"category": "general",
"text": "An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0544",
"url": "https://www.suse.com/security/cve/CVE-2022-0544"
},
{
"category": "external",
"summary": "SUSE Bug 1195740 for CVE-2022-0544",
"url": "https://bugzilla.suse.com/1195740"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0544"
},
{
"cve": "CVE-2022-0545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0545"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0545",
"url": "https://www.suse.com/security/cve/CVE-2022-0545"
},
{
"category": "external",
"summary": "SUSE Bug 1195739 for CVE-2022-0545",
"url": "https://bugzilla.suse.com/1195739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0545"
},
{
"cve": "CVE-2022-0546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0546"
}
],
"notes": [
{
"category": "general",
"text": "A missing bounds check in the image loader used in Blender 3.x and 2.93.8 leads to out-of-bounds heap access, allowing an attacker to cause denial of service, memory corruption or potentially code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0546",
"url": "https://www.suse.com/security/cve/CVE-2022-0546"
},
{
"category": "external",
"summary": "SUSE Bug 1195738 for CVE-2022-0546",
"url": "https://bugzilla.suse.com/1195738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0546"
}
]
}
OPENSUSE-SU-2025:15755-1
Vulnerability from csaf_opensuse - Published: 2025-11-21 00:00 - Updated: 2025-11-21 00:00Summary
blender-4.5-4.5.4-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: blender-4.5-4.5.4-1.1 on GA media
Description of the patch: These are all security issues fixed in the blender-4.5-4.5.4-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2025-15755
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "blender-4.5-4.5.4-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the blender-4.5-4.5.4-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15755",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15755-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0544 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0546 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0546/"
}
],
"title": "blender-4.5-4.5.4-1.1 on GA media",
"tracking": {
"current_release_date": "2025-11-21T00:00:00Z",
"generator": {
"date": "2025-11-21T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15755-1",
"initial_release_date": "2025-11-21T00:00:00Z",
"revision_history": [
{
"date": "2025-11-21T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "blender-4.5-4.5.4-1.1.aarch64",
"product": {
"name": "blender-4.5-4.5.4-1.1.aarch64",
"product_id": "blender-4.5-4.5.4-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "blender-4.5-demo-4.5.4-1.1.aarch64",
"product": {
"name": "blender-4.5-demo-4.5.4-1.1.aarch64",
"product_id": "blender-4.5-demo-4.5.4-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "blender-4.5-lang-4.5.4-1.1.aarch64",
"product": {
"name": "blender-4.5-lang-4.5.4-1.1.aarch64",
"product_id": "blender-4.5-lang-4.5.4-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-4.5-4.5.4-1.1.ppc64le",
"product": {
"name": "blender-4.5-4.5.4-1.1.ppc64le",
"product_id": "blender-4.5-4.5.4-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "blender-4.5-demo-4.5.4-1.1.ppc64le",
"product": {
"name": "blender-4.5-demo-4.5.4-1.1.ppc64le",
"product_id": "blender-4.5-demo-4.5.4-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "blender-4.5-lang-4.5.4-1.1.ppc64le",
"product": {
"name": "blender-4.5-lang-4.5.4-1.1.ppc64le",
"product_id": "blender-4.5-lang-4.5.4-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-4.5-4.5.4-1.1.s390x",
"product": {
"name": "blender-4.5-4.5.4-1.1.s390x",
"product_id": "blender-4.5-4.5.4-1.1.s390x"
}
},
{
"category": "product_version",
"name": "blender-4.5-demo-4.5.4-1.1.s390x",
"product": {
"name": "blender-4.5-demo-4.5.4-1.1.s390x",
"product_id": "blender-4.5-demo-4.5.4-1.1.s390x"
}
},
{
"category": "product_version",
"name": "blender-4.5-lang-4.5.4-1.1.s390x",
"product": {
"name": "blender-4.5-lang-4.5.4-1.1.s390x",
"product_id": "blender-4.5-lang-4.5.4-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-4.5-4.5.4-1.1.x86_64",
"product": {
"name": "blender-4.5-4.5.4-1.1.x86_64",
"product_id": "blender-4.5-4.5.4-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "blender-4.5-demo-4.5.4-1.1.x86_64",
"product": {
"name": "blender-4.5-demo-4.5.4-1.1.x86_64",
"product_id": "blender-4.5-demo-4.5.4-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "blender-4.5-lang-4.5.4-1.1.x86_64",
"product": {
"name": "blender-4.5-lang-4.5.4-1.1.x86_64",
"product_id": "blender-4.5-lang-4.5.4-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-4.5.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64"
},
"product_reference": "blender-4.5-4.5.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-4.5.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le"
},
"product_reference": "blender-4.5-4.5.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-4.5.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x"
},
"product_reference": "blender-4.5-4.5.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-4.5.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64"
},
"product_reference": "blender-4.5-4.5.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-demo-4.5.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64"
},
"product_reference": "blender-4.5-demo-4.5.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-demo-4.5.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le"
},
"product_reference": "blender-4.5-demo-4.5.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-demo-4.5.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x"
},
"product_reference": "blender-4.5-demo-4.5.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-demo-4.5.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64"
},
"product_reference": "blender-4.5-demo-4.5.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-lang-4.5.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64"
},
"product_reference": "blender-4.5-lang-4.5.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-lang-4.5.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le"
},
"product_reference": "blender-4.5-lang-4.5.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-lang-4.5.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x"
},
"product_reference": "blender-4.5-lang-4.5.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-lang-4.5.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
},
"product_reference": "blender-4.5-lang-4.5.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-0544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0544"
}
],
"notes": [
{
"category": "general",
"text": "An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0544",
"url": "https://www.suse.com/security/cve/CVE-2022-0544"
},
{
"category": "external",
"summary": "SUSE Bug 1195740 for CVE-2022-0544",
"url": "https://bugzilla.suse.com/1195740"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0544"
},
{
"cve": "CVE-2022-0545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0545"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0545",
"url": "https://www.suse.com/security/cve/CVE-2022-0545"
},
{
"category": "external",
"summary": "SUSE Bug 1195739 for CVE-2022-0545",
"url": "https://bugzilla.suse.com/1195739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0545"
},
{
"cve": "CVE-2022-0546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0546"
}
],
"notes": [
{
"category": "general",
"text": "A missing bounds check in the image loader used in Blender 3.x and 2.93.8 leads to out-of-bounds heap access, allowing an attacker to cause denial of service, memory corruption or potentially code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0546",
"url": "https://www.suse.com/security/cve/CVE-2022-0546"
},
{
"category": "external",
"summary": "SUSE Bug 1195738 for CVE-2022-0546",
"url": "https://bugzilla.suse.com/1195738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0546"
}
]
}
OPENSUSE-SU-2025:15756-1
Vulnerability from csaf_opensuse - Published: 2025-11-21 00:00 - Updated: 2025-11-21 00:00Summary
blender-5.0-5.0.0-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: blender-5.0-5.0.0-1.1 on GA media
Description of the patch: These are all security issues fixed in the blender-5.0-5.0.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2025-15756
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "blender-5.0-5.0.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the blender-5.0-5.0.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15756",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15756-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0544 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0546 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0546/"
}
],
"title": "blender-5.0-5.0.0-1.1 on GA media",
"tracking": {
"current_release_date": "2025-11-21T00:00:00Z",
"generator": {
"date": "2025-11-21T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15756-1",
"initial_release_date": "2025-11-21T00:00:00Z",
"revision_history": [
{
"date": "2025-11-21T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "blender-5.0-5.0.0-1.1.aarch64",
"product": {
"name": "blender-5.0-5.0.0-1.1.aarch64",
"product_id": "blender-5.0-5.0.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "blender-5.0-demo-5.0.0-1.1.aarch64",
"product": {
"name": "blender-5.0-demo-5.0.0-1.1.aarch64",
"product_id": "blender-5.0-demo-5.0.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "blender-5.0-lang-5.0.0-1.1.aarch64",
"product": {
"name": "blender-5.0-lang-5.0.0-1.1.aarch64",
"product_id": "blender-5.0-lang-5.0.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-5.0-5.0.0-1.1.ppc64le",
"product": {
"name": "blender-5.0-5.0.0-1.1.ppc64le",
"product_id": "blender-5.0-5.0.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "blender-5.0-demo-5.0.0-1.1.ppc64le",
"product": {
"name": "blender-5.0-demo-5.0.0-1.1.ppc64le",
"product_id": "blender-5.0-demo-5.0.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "blender-5.0-lang-5.0.0-1.1.ppc64le",
"product": {
"name": "blender-5.0-lang-5.0.0-1.1.ppc64le",
"product_id": "blender-5.0-lang-5.0.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-5.0-5.0.0-1.1.s390x",
"product": {
"name": "blender-5.0-5.0.0-1.1.s390x",
"product_id": "blender-5.0-5.0.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "blender-5.0-demo-5.0.0-1.1.s390x",
"product": {
"name": "blender-5.0-demo-5.0.0-1.1.s390x",
"product_id": "blender-5.0-demo-5.0.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "blender-5.0-lang-5.0.0-1.1.s390x",
"product": {
"name": "blender-5.0-lang-5.0.0-1.1.s390x",
"product_id": "blender-5.0-lang-5.0.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-5.0-5.0.0-1.1.x86_64",
"product": {
"name": "blender-5.0-5.0.0-1.1.x86_64",
"product_id": "blender-5.0-5.0.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "blender-5.0-demo-5.0.0-1.1.x86_64",
"product": {
"name": "blender-5.0-demo-5.0.0-1.1.x86_64",
"product_id": "blender-5.0-demo-5.0.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "blender-5.0-lang-5.0.0-1.1.x86_64",
"product": {
"name": "blender-5.0-lang-5.0.0-1.1.x86_64",
"product_id": "blender-5.0-lang-5.0.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-5.0.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64"
},
"product_reference": "blender-5.0-5.0.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-5.0.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le"
},
"product_reference": "blender-5.0-5.0.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-5.0.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x"
},
"product_reference": "blender-5.0-5.0.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-5.0.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64"
},
"product_reference": "blender-5.0-5.0.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-demo-5.0.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64"
},
"product_reference": "blender-5.0-demo-5.0.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-demo-5.0.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le"
},
"product_reference": "blender-5.0-demo-5.0.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-demo-5.0.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x"
},
"product_reference": "blender-5.0-demo-5.0.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-demo-5.0.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64"
},
"product_reference": "blender-5.0-demo-5.0.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-lang-5.0.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64"
},
"product_reference": "blender-5.0-lang-5.0.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-lang-5.0.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le"
},
"product_reference": "blender-5.0-lang-5.0.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-lang-5.0.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x"
},
"product_reference": "blender-5.0-lang-5.0.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-lang-5.0.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
},
"product_reference": "blender-5.0-lang-5.0.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-0544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0544"
}
],
"notes": [
{
"category": "general",
"text": "An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0544",
"url": "https://www.suse.com/security/cve/CVE-2022-0544"
},
{
"category": "external",
"summary": "SUSE Bug 1195740 for CVE-2022-0544",
"url": "https://bugzilla.suse.com/1195740"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0544"
},
{
"cve": "CVE-2022-0545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0545"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0545",
"url": "https://www.suse.com/security/cve/CVE-2022-0545"
},
{
"category": "external",
"summary": "SUSE Bug 1195739 for CVE-2022-0545",
"url": "https://bugzilla.suse.com/1195739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0545"
},
{
"cve": "CVE-2022-0546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0546"
}
],
"notes": [
{
"category": "general",
"text": "A missing bounds check in the image loader used in Blender 3.x and 2.93.8 leads to out-of-bounds heap access, allowing an attacker to cause denial of service, memory corruption or potentially code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0546",
"url": "https://www.suse.com/security/cve/CVE-2022-0546"
},
{
"category": "external",
"summary": "SUSE Bug 1195738 for CVE-2022-0546",
"url": "https://bugzilla.suse.com/1195738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0546"
}
]
}
GHSA-VWMP-5FXW-2GWJ
Vulnerability from github – Published: 2022-02-25 00:00 – Updated: 2022-06-30 00:00
VLAI?
Details
An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.
Severity ?
7.8 (High)
{
"affected": [],
"aliases": [
"CVE-2022-0545"
],
"database_specific": {
"cwe_ids": [
"CWE-190"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-02-24T19:15:00Z",
"severity": "HIGH"
},
"details": "An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"id": "GHSA-vwmp-5fxw-2gwj",
"modified": "2022-06-30T00:00:42Z",
"published": "2022-02-25T00:00:58Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0545"
},
{
"type": "WEB",
"url": "https://developer.blender.org/T94629"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2022/dsa-5176"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
BDU:2022-05849
Vulnerability from fstec - Published: 04.01.2022
VLAI Severity ?
Title
Уязвимость функции IMB_flipy() компонента source/blender/imbuf/intern/rotate.c набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Description
Уязвимость функции IMB_flipy() компонента source/blender/imbuf/intern/rotate.c набора программного обеспечения для создания трехмерной компьютерной графики Blender связана с целочисленным переполнением. Эксплуатация уязвимости позволяет нарушителю, действующему удаленно, получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании с помощью специально созданного файла изображения
Severity ?
Vendor
ООО «РусБИТех-Астра», Сообщество свободного программного обеспечения, ООО «Ред Софт», Blender Foundation, АО "НППКТ"
Software Name
Astra Linux Special Edition (запись в едином реестре российских программ №369), Debian GNU/Linux, РЕД ОС (запись в едином реестре российских программ №3751), Blender, ОСОН ОСнова Оnyx (запись в едином реестре российских программ №5913)
Software Version
1.6 «Смоленск» (Astra Linux Special Edition), 10 (Debian GNU/Linux), 11 (Debian GNU/Linux), 7.3 (РЕД ОС), 1.7 (Astra Linux Special Edition), до 2.83.19 (Blender), от 2.90.0 до 2.93.8 (Blender), от 3.0.0 до 3.1.0 (Blender), 4.7 (Astra Linux Special Edition), до 2.5.2 (ОСОН ОСнова Оnyx)
Possible Mitigations
Для Blender:
использование рекомендаций производителя: https://developer.blender.org/D13744
Для Debian:
использование рекомендаций производителя: https://security-tracker.debian.org/tracker/CVE-2022-0545
Для ОС Astra Linux:
использование рекомендаций производителя:
https://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47
https://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17
Для ОСОН ОСнова Оnyx:
Обновление программного обеспечения blender до версии 2.79.b+dfsg0-7+deb10u1
Для РедОС: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Для ОС Astra Linux 1.6 «Смоленск»:
обновить пакет blender до 2.79.b+dfsg0-1~deb9u2 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16
Reference
https://developer.blender.org/D13744
https://security-tracker.debian.org/tracker/CVE-2022-0545
https://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47
https://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17
https://поддержка.нппкт.рф/bin/view/ОСнова/Обновления/2.5.2/
http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
https://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16
CWE
CWE-190
{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, Blender Foundation, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 10 (Debian GNU/Linux), 11 (Debian GNU/Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 1.7 (Astra Linux Special Edition), \u0434\u043e 2.83.19 (Blender), \u043e\u0442 2.90.0 \u0434\u043e 2.93.8 (Blender), \u043e\u0442 3.0.0 \u0434\u043e 3.1.0 (Blender), 4.7 (Astra Linux Special Edition), \u0434\u043e 2.5.2 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f Blender:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://developer.blender.org/D13744\n\n\u0414\u043b\u044f Debian:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://security-tracker.debian.org/tracker/CVE-2022-0545\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f blender \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.79.b+dfsg0-7+deb10u1\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 blender \u0434\u043e 2.79.b+dfsg0-1~deb9u2 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "04.01.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "30.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "21.09.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-05849",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-0545",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Debian GNU/Linux, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Blender, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.5.2 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 IMB_flipy() \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 source/blender/imbuf/intern/rotate.c \u043d\u0430\u0431\u043e\u0440\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0442\u0440\u0435\u0445\u043c\u0435\u0440\u043d\u043e\u0439 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u043d\u043e\u0439 \u0433\u0440\u0430\u0444\u0438\u043a\u0438 Blender, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0426\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0438\u043b\u0438 \u0446\u0438\u043a\u043b\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0441\u0434\u0432\u0438\u0433 (CWE-190)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 IMB_flipy() \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 source/blender/imbuf/intern/rotate.c \u043d\u0430\u0431\u043e\u0440\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0442\u0440\u0435\u0445\u043c\u0435\u0440\u043d\u043e\u0439 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u043d\u043e\u0439 \u0433\u0440\u0430\u0444\u0438\u043a\u0438 Blender \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0446\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u043c \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430 \u0438\u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://developer.blender.org/D13744\nhttps://security-tracker.debian.org/tracker/CVE-2022-0545\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.5.2/\nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-190",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,6)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
GSD-2022-0545
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-0545",
"description": "An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"id": "GSD-2022-0545",
"references": [
"https://www.suse.com/security/cve/CVE-2022-0545.html",
"https://www.debian.org/security/2022/dsa-5176",
"https://security.archlinux.org/CVE-2022-0545"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-0545"
],
"details": "An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"id": "GSD-2022-0545",
"modified": "2023-12-13T01:19:11.689928Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "patrick@puiterwijk.org",
"ID": "CVE-2022-0545",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Blender",
"version": {
"version_data": [
{
"version_value": "Blender versions prior to 2.83.19, 2.93.8 and 3.1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-190-\u003eCWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://developer.blender.org/T94629",
"refsource": "MISC",
"url": "https://developer.blender.org/T94629"
},
{
"name": "[debian-lts-announce] 20220628 [SECURITY] [DLA 3060-1] blender security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html"
},
{
"name": "DSA-5176",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2022/dsa-5176"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "991AC87F-A637-42E2-ADDE-CAFBBD158A8A",
"versionEndExcluding": "2.83.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A9A6568C-F50D-4D37-B285-D75AB53362BE",
"versionEndExcluding": "2.93.8",
"versionStartIncluding": "2.90.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "677B439D-E7C7-4BFF-92A1-869746B9A2B0",
"versionEndExcluding": "3.1.0",
"versionStartIncluding": "3.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1."
},
{
"lang": "es",
"value": "Un desbordamiento de enteros en el procesamiento de im\u00e1genes 2D cargadas conlleva a una vulnerabilidad de escritura y lectura fuera de l\u00edmites, permitiendo a un atacante filtrar informaci\u00f3n confidencial o lograr una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso de Blender cuando es cargado un archivo de imagen especialmente dise\u00f1ado. Este fallo afecta a Blender versiones anteriores a la 2.83.19, 2.93.8 y 3.1"
}
],
"id": "CVE-2022-0545",
"lastModified": "2024-02-02T03:09:18.633",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-02-24T19:15:09.760",
"references": [
{
"source": "patrick@puiterwijk.org",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://developer.blender.org/T94629"
},
{
"source": "patrick@puiterwijk.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html"
},
{
"source": "patrick@puiterwijk.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5176"
}
],
"sourceIdentifier": "patrick@puiterwijk.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "patrick@puiterwijk.org",
"type": "Secondary"
}
]
}
}
}
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…