ALT-BU-2018-3245-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2022-05866
Уязвимость функции nikon_coolscan_load_raw() компонента internal/dcraw_common.cpp библиотеки для обработки изображений LibRaw, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05867
Уязвимость функции rollei_load_raw() компонента internal/dcraw_common.cpp библиотеки для обработки изображений LibRaw, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05870
Уязвимость компонента internal/dcraw_common.cpp библиотеки для обработки изображений LibRaw, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05954
Уязвимость компонента dcraw/dcraw.c библиотеки для обработки изображений LibRaw, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05959
Уязвимость компонента internal/dcraw_common.cpp библиотеки для обработки изображений LibRaw, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-5807
An error within the "samsung_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9
- https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9
- 81800
- 81800
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/
- USN-3838-1
- USN-3838-1
Modified: 2024-11-21
CVE-2018-5808
An error within the "find_green()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9
- https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9
- [debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update
- [debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update
- 81800
- 81800
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/
Modified: 2024-11-21
CVE-2018-5809
An error within the "LibRaw::parse_exif()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9
- https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9
- 81800
- 81800
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/
Modified: 2024-11-21
CVE-2018-5810
An error within the "rollei_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9
- https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9
- 81800
- 81800
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/
- USN-3838-1
- USN-3838-1
Modified: 2024-11-21
CVE-2018-5811
An error within the "nikon_coolscan_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9
- https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9
- 81800
- 81800
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/
- USN-3838-1
- USN-3838-1
Modified: 2024-11-21
CVE-2018-5812
An error within the "nikon_coolscan_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to trigger a NULL pointer dereference.
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9
- https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9
- 81800
- 81800
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/
- USN-3838-1
- USN-3838-1
Modified: 2024-11-21
CVE-2018-5813
An error within the "parse_minolta()" function (dcraw/dcraw.c) in LibRaw versions prior to 0.18.11 can be exploited to trigger an infinite loop via a specially crafted file.
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://github.com/LibRaw/LibRaw/commit/e47384546b43d0fd536e933249047bc397a4d88b
- https://github.com/LibRaw/LibRaw/commit/e47384546b43d0fd536e933249047bc397a4d88b
- 83050
- 83050
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-13/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-13/
- USN-3838-1
- USN-3838-1
Closed vulnerabilities
BDU:2019-00507
Уязвимость набора программного обеспечения для создания трехмерной компьютерной графики Blender, связанная с целочисленным переполнением при обработке .blend-файла, позволяющая нарушителю выполнить код в контексте приложения
BDU:2019-04047
Уязвимость компонента Mesh набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код
BDU:2019-04048
Уязвимость компонента CustomData набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код
BDU:2019-04049
Уязвимость компонента BKE_mesh_calc_normals_tessface набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код
BDU:2019-04050
Уязвимость компонента tface набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код
BDU:2019-04051
Уязвимость компонента multires_load_old_dm набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код
BDU:2019-04052
Уязвимость компонента modifier_mdef_compact_influences набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код
BDU:2019-04053
Уязвимость набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
BDU:2019-04054
Уязвимость компонента Particle набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код
BDU:2019-04055
Уязвимость компонента Mesh набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код
BDU:2019-04162
Уязвимость набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
BDU:2019-04163
Уязвимость набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
BDU:2019-04164
Уязвимость набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
BDU:2019-04165
Уязвимость модуля DPX набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код
BDU:2019-04166
Уязвимость модуля DPX набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
BDU:2019-04167
Уязвимость модуля RADIANCE набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
BDU:2019-04168
Уязвимость набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
BDU:2019-04169
Уязвимость функции воспроизведения анимации набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
BDU:2019-04170
Уязвимость функции воспроизведения анимации набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
BDU:2019-04171
Уязвимость набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
BDU:2019-04172
Уязвимость модуля загрузки изображений набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2017-12081
An exploitable integer overflow exists in the upgrade of a legacy Mesh attribute of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use it as a library in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0433
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0433
Modified: 2024-11-21
CVE-2017-12082
An exploitable integer overflow exists in the 'CustomData' Mesh loading functionality of the Blender open-source 3d creation suite. A .blend file with a specially crafted external data file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to edit an object within a .blend library in their Scene in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0434
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0434
Modified: 2024-11-21
CVE-2017-12086
An exploitable integer overflow exists in the 'BKE_mesh_calc_normals_tessface' functionality of the Blender open-source 3d creation suite. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open a .blend file in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0438
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0438
Modified: 2024-11-21
CVE-2017-12099
An exploitable integer overflow exists in the upgrade of the legacy Mesh attribute 'tface' of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use it as a library in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0451
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0451
Modified: 2024-11-21
CVE-2017-12100
An exploitable integer overflow exists in the 'multires_load_old_dm' functionality of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open a .blend file in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0452
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0452
Modified: 2024-11-21
CVE-2017-12101
An exploitable integer overflow exists in the 'modifier_mdef_compact_influences' functionality of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open a .blend file in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0453
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0453
Modified: 2024-11-21
CVE-2017-12102
An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c converts curves to polygons. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0454
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0454
Modified: 2024-11-21
CVE-2017-12103
An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c converts text rendered as a font into a curve. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0455
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0455
Modified: 2024-11-21
CVE-2017-12104
An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c draws a Particle object. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0456
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0456
Modified: 2024-11-21
CVE-2017-12105
An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c applies a particular object modifier to a Mesh. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0457
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0457
Modified: 2024-11-21
CVE-2017-2899
An exploitable integer overflow exists in the TIFF loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.tif' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0406
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0406
Modified: 2024-11-21
CVE-2017-2900
An exploitable integer overflow exists in the PNG loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.png' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0407
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0407
Modified: 2024-11-21
CVE-2017-2901
An exploitable integer overflow exists in the IRIS loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.iris' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0408
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0408
Modified: 2024-11-21
CVE-2017-2902
An exploitable integer overflow exists in the DPX loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.cin' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0409
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0409
Modified: 2024-11-21
CVE-2017-2903
An exploitable integer overflow exists in the DPX loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.cin' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0410
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0410
Modified: 2024-11-21
CVE-2017-2904
An exploitable integer overflow exists in the RADIANCE loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.hdr' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0411
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0411
Modified: 2024-11-21
CVE-2017-2905
An exploitable integer overflow exists in the bmp loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.bmp' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0412
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0412
Modified: 2024-11-21
CVE-2017-2906
An exploitable integer overflow exists in the animation playing functionality of the Blender open-source 3d creation suite version 2.78c. A specially created '.avi' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0413
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0413
Modified: 2024-11-21
CVE-2017-2907
An exploitable integer overflow exists in the animation playing functionality of the Blender open-source 3d creation suite version 2.78c. A specially created '.avi' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0414
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0414
Modified: 2024-11-21
CVE-2017-2908
An exploitable integer overflow exists in the thumbnail functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to render the thumbnail for the file while in the File->Open dialog.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0415
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0415
Modified: 2024-11-21
CVE-2017-2918
An exploitable integer overflow exists in the Image loading functionality of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use it as a library in order to trigger this vulnerability.
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- [debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update
- DSA-4248
- DSA-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0425
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0425
Closed bugs
scanimage вываливается с ошибкой
Closed bugs
1.14 released