[Bug 1103535] New: VUL-0: blender: Multiple vulnerabilities
http://bugzilla.opensuse.org/show_bug.cgi?id=1103535 Bug ID: 1103535 Summary: VUL-0: blender: Multiple vulnerabilities Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.3 Hardware: Other URL: https://smash.suse.de/issue/212074/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: davejplater@gmail.com Reporter: jsegitz@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- CVE-2017-12103: An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c converts curves to polygons. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability. https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0454 CVE-2017-2906: An exploitable integer overflow exists in the animation playing functionality of the Blender open-source 3d creation suite version 2.78c. A specially created '.avi' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset in order to trigger this vulnerability. https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0413 CVE-2017-2907: An exploitable integer overflow exists in the animation playing functionality of the Blender open-source 3d creation suite version 2.78c. A specially created '.avi' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset in order to trigger this vulnerability. https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0414 CVE-2017-2908: An exploitable integer overflow exists in the thumbnail functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to render the thumbnail for the file while in the File->Open dialog. https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0415 CVE-2017-12105: An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c applies a particular object modifier to a Mesh. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability. https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0457 CVE-2017-2918: An exploitable integer overflow exists in the Image loading functionality of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use it as a library in order to trigger this vulnerability. https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0425 CVE-2017-12104: An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c draws a Particle object. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability. https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0425 CVE-2017-12101: An exploitable integer overflow exists in the 'modifier_mdef_compact_influences' functionality of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open a .blend file in order to trigger this vulnerability. https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0453 CVE-2017-12100: An exploitable integer overflow exists in the 'multires_load_old_dm' functionality of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open a .blend file in order to trigger this vulnerability. https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0452 CVE-2017-12099: An exploitable integer overflow exists in the upgrade of the legacy Mesh attribute 'tface' of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use it as a library in order to trigger this vulnerability. https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0451 CVE-2017-12082: An exploitable integer overflow exists in the 'CustomData' Mesh loading functionality of the Blender open-source 3d creation suite. A .blend file with a specially crafted external data file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to edit an object within a .blend library in their Scene in order to trigger this vulnerability. https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0434 CVE-2017-12081: An exploitable integer overflow exists in the upgrade of a legacy Mesh attribute of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use it as a library in order to trigger this vulnerability. https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0433 CVE-2017-12103: An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c converts text rendered as a font into a curve. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability. https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0455 CVE-2017-2905: An exploitable integer overflow exists in the bmp loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.bmp' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability. https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0412 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1103535 http://bugzilla.opensuse.org/show_bug.cgi?id=1103535#c1 --- Comment #1 from Johannes Segitz <jsegitz@suse.com> --- so judging from last time we'll only fix Leap 15 and Factory -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1103535 http://bugzilla.opensuse.org/show_bug.cgi?id=1103535#c2 --- Comment #2 from Dave Plater <davejplater@gmail.com> --- openSUSE:Leap:15 and Tumbleweed are on version 2.79b, aren't the vulnerabilities fixed by this version? Cannot patch Leap:42.3's blender-2.76b there are too many differences. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1103535 http://bugzilla.opensuse.org/show_bug.cgi?id=1103535#c3 Dave Plater <davejplater@gmail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |IN_PROGRESS CC| |jsegitz@suse.com Flags| |needinfo?(jsegitz@suse.com) --- Comment #3 from Dave Plater <davejplater@gmail.com> --- (In reply to Dave Plater from comment #2)
openSUSE:Leap:15 and Tumbleweed are on version 2.79b, aren't the vulnerabilities fixed by this version? Cannot patch Leap:42.3's blender-2.76b there are too many differences.
See Bug 1090836 which this bug appears to be a duplicate of. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com