Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-0544 (GCVE-0-2022-0544)
Vulnerability from cvelistv5 – Published: 2022-02-24 18:27 – Updated: 2024-08-02 23:32
VLAI?
EPSS
Summary
An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.
Severity ?
No CVSS data available.
CWE
- CWE-191 - >CWE-125
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T23:32:46.106Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://developer.blender.org/T94661"
},
{
"name": "[debian-lts-announce] 20220628 [SECURITY] [DLA 3060-1] blender security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html"
},
{
"name": "DSA-5176",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2022/dsa-5176"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Blender",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Blender versions prior to 2.83.19, 2.93.8 and 3.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-191",
"description": "CWE-191-\u003eCWE-125",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-07-05T10:06:20.000Z",
"orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"shortName": "fedora"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://developer.blender.org/T94661"
},
{
"name": "[debian-lts-announce] 20220628 [SECURITY] [DLA 3060-1] blender security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html"
},
{
"name": "DSA-5176",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2022/dsa-5176"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "patrick@puiterwijk.org",
"ID": "CVE-2022-0544",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Blender",
"version": {
"version_data": [
{
"version_value": "Blender versions prior to 2.83.19, 2.93.8 and 3.1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-191-\u003eCWE-125"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://developer.blender.org/T94661",
"refsource": "MISC",
"url": "https://developer.blender.org/T94661"
},
{
"name": "[debian-lts-announce] 20220628 [SECURITY] [DLA 3060-1] blender security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html"
},
{
"name": "DSA-5176",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2022/dsa-5176"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"assignerShortName": "fedora",
"cveId": "CVE-2022-0544",
"datePublished": "2022-02-24T18:27:15.000Z",
"dateReserved": "2022-02-08T00:00:00.000Z",
"dateUpdated": "2024-08-02T23:32:46.106Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.83.19\", \"matchCriteriaId\": \"991AC87F-A637-42E2-ADDE-CAFBBD158A8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.90.0\", \"versionEndExcluding\": \"2.93.8\", \"matchCriteriaId\": \"A9A6568C-F50D-4D37-B285-D75AB53362BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.0\", \"versionEndExcluding\": \"3.1\", \"matchCriteriaId\": \"9CBA54F2-2674-4575-A98E-D5474339A94E\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.\"}, {\"lang\": \"es\", \"value\": \"Un desbordamiento de enteros en el cargador DDS de Blender conlleva a una lectura fuera de l\\u00edmites, permitiendo posiblemente a un atacante leer datos confidenciales usando un archivo de imagen DDS dise\\u00f1ado. Este fallo afecta a Blender versiones anteriores a 2.83.19, 2.93.8 y 3.1\"}]",
"id": "CVE-2022-0544",
"lastModified": "2024-11-21T06:38:53.007",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:N/C:P/I:N/A:N\", \"baseScore\": 2.6, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 4.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2022-02-24T19:15:09.713",
"references": "[{\"url\": \"https://developer.blender.org/T94661\", \"source\": \"patrick@puiterwijk.org\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html\", \"source\": \"patrick@puiterwijk.org\"}, {\"url\": \"https://www.debian.org/security/2022/dsa-5176\", \"source\": \"patrick@puiterwijk.org\"}, {\"url\": \"https://developer.blender.org/T94661\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.debian.org/security/2022/dsa-5176\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "patrick@puiterwijk.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"patrick@puiterwijk.org\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-191\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-191\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-0544\",\"sourceIdentifier\":\"patrick@puiterwijk.org\",\"published\":\"2022-02-24T19:15:09.713\",\"lastModified\":\"2024-11-21T06:38:53.007\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de enteros en el cargador DDS de Blender conlleva a una lectura fuera de l\u00edmites, permitiendo posiblemente a un atacante leer datos confidenciales usando un archivo de imagen DDS dise\u00f1ado. Este fallo afecta a Blender versiones anteriores a 2.83.19, 2.93.8 y 3.1\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:N/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"patrick@puiterwijk.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-191\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-191\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.83.19\",\"matchCriteriaId\":\"991AC87F-A637-42E2-ADDE-CAFBBD158A8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.90.0\",\"versionEndExcluding\":\"2.93.8\",\"matchCriteriaId\":\"A9A6568C-F50D-4D37-B285-D75AB53362BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"3.1\",\"matchCriteriaId\":\"9CBA54F2-2674-4575-A98E-D5474339A94E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}],\"references\":[{\"url\":\"https://developer.blender.org/T94661\",\"source\":\"patrick@puiterwijk.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html\",\"source\":\"patrick@puiterwijk.org\"},{\"url\":\"https://www.debian.org/security/2022/dsa-5176\",\"source\":\"patrick@puiterwijk.org\"},{\"url\":\"https://developer.blender.org/T94661\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2022/dsa-5176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
GSD-2022-0544
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-0544",
"description": "An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"id": "GSD-2022-0544",
"references": [
"https://www.suse.com/security/cve/CVE-2022-0544.html",
"https://www.debian.org/security/2022/dsa-5176",
"https://security.archlinux.org/CVE-2022-0544"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-0544"
],
"details": "An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"id": "GSD-2022-0544",
"modified": "2023-12-13T01:19:11.889778Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "patrick@puiterwijk.org",
"ID": "CVE-2022-0544",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Blender",
"version": {
"version_data": [
{
"version_value": "Blender versions prior to 2.83.19, 2.93.8 and 3.1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-191-\u003eCWE-125"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://developer.blender.org/T94661",
"refsource": "MISC",
"url": "https://developer.blender.org/T94661"
},
{
"name": "[debian-lts-announce] 20220628 [SECURITY] [DLA 3060-1] blender security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html"
},
{
"name": "DSA-5176",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2022/dsa-5176"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.1",
"versionStartIncluding": "3.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.93.8",
"versionStartIncluding": "2.90.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.83.19",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@elastic.co",
"ID": "CVE-2022-0544"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://developer.blender.org/T94661",
"refsource": "MISC",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "https://developer.blender.org/T94661"
},
{
"name": "[debian-lts-announce] 20220628 [SECURITY] [DLA 3060-1] blender security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html"
},
{
"name": "DSA-5176",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5176"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-01-19T03:33Z",
"publishedDate": "2022-02-24T19:15Z"
}
}
}
OPENSUSE-SU-2024:11859-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
blender-3.0.1-2.1 on GA media
Severity
Moderate
Notes
Title of the patch: blender-3.0.1-2.1 on GA media
Description of the patch: These are all security issues fixed in the blender-3.0.1-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-11859
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "blender-3.0.1-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the blender-3.0.1-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11859",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11859-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0544 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0546 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0546/"
}
],
"title": "blender-3.0.1-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11859-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "blender-3.0.1-2.1.aarch64",
"product": {
"name": "blender-3.0.1-2.1.aarch64",
"product_id": "blender-3.0.1-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "blender-cycles-devel-3.0.1-2.1.aarch64",
"product": {
"name": "blender-cycles-devel-3.0.1-2.1.aarch64",
"product_id": "blender-cycles-devel-3.0.1-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "blender-demo-3.0.1-2.1.aarch64",
"product": {
"name": "blender-demo-3.0.1-2.1.aarch64",
"product_id": "blender-demo-3.0.1-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "blender-lang-3.0.1-2.1.aarch64",
"product": {
"name": "blender-lang-3.0.1-2.1.aarch64",
"product_id": "blender-lang-3.0.1-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-3.0.1-2.1.ppc64le",
"product": {
"name": "blender-3.0.1-2.1.ppc64le",
"product_id": "blender-3.0.1-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "blender-cycles-devel-3.0.1-2.1.ppc64le",
"product": {
"name": "blender-cycles-devel-3.0.1-2.1.ppc64le",
"product_id": "blender-cycles-devel-3.0.1-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "blender-demo-3.0.1-2.1.ppc64le",
"product": {
"name": "blender-demo-3.0.1-2.1.ppc64le",
"product_id": "blender-demo-3.0.1-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "blender-lang-3.0.1-2.1.ppc64le",
"product": {
"name": "blender-lang-3.0.1-2.1.ppc64le",
"product_id": "blender-lang-3.0.1-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-3.0.1-2.1.s390x",
"product": {
"name": "blender-3.0.1-2.1.s390x",
"product_id": "blender-3.0.1-2.1.s390x"
}
},
{
"category": "product_version",
"name": "blender-cycles-devel-3.0.1-2.1.s390x",
"product": {
"name": "blender-cycles-devel-3.0.1-2.1.s390x",
"product_id": "blender-cycles-devel-3.0.1-2.1.s390x"
}
},
{
"category": "product_version",
"name": "blender-demo-3.0.1-2.1.s390x",
"product": {
"name": "blender-demo-3.0.1-2.1.s390x",
"product_id": "blender-demo-3.0.1-2.1.s390x"
}
},
{
"category": "product_version",
"name": "blender-lang-3.0.1-2.1.s390x",
"product": {
"name": "blender-lang-3.0.1-2.1.s390x",
"product_id": "blender-lang-3.0.1-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-3.0.1-2.1.x86_64",
"product": {
"name": "blender-3.0.1-2.1.x86_64",
"product_id": "blender-3.0.1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "blender-cycles-devel-3.0.1-2.1.x86_64",
"product": {
"name": "blender-cycles-devel-3.0.1-2.1.x86_64",
"product_id": "blender-cycles-devel-3.0.1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "blender-demo-3.0.1-2.1.x86_64",
"product": {
"name": "blender-demo-3.0.1-2.1.x86_64",
"product_id": "blender-demo-3.0.1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "blender-lang-3.0.1-2.1.x86_64",
"product": {
"name": "blender-lang-3.0.1-2.1.x86_64",
"product_id": "blender-lang-3.0.1-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-3.0.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64"
},
"product_reference": "blender-3.0.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-3.0.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le"
},
"product_reference": "blender-3.0.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-3.0.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-3.0.1-2.1.s390x"
},
"product_reference": "blender-3.0.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-3.0.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64"
},
"product_reference": "blender-3.0.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-cycles-devel-3.0.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64"
},
"product_reference": "blender-cycles-devel-3.0.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-cycles-devel-3.0.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le"
},
"product_reference": "blender-cycles-devel-3.0.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-cycles-devel-3.0.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x"
},
"product_reference": "blender-cycles-devel-3.0.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-cycles-devel-3.0.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64"
},
"product_reference": "blender-cycles-devel-3.0.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-demo-3.0.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64"
},
"product_reference": "blender-demo-3.0.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-demo-3.0.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le"
},
"product_reference": "blender-demo-3.0.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-demo-3.0.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x"
},
"product_reference": "blender-demo-3.0.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-demo-3.0.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64"
},
"product_reference": "blender-demo-3.0.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-lang-3.0.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64"
},
"product_reference": "blender-lang-3.0.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-lang-3.0.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le"
},
"product_reference": "blender-lang-3.0.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-lang-3.0.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x"
},
"product_reference": "blender-lang-3.0.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-lang-3.0.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
},
"product_reference": "blender-lang-3.0.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-0544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0544"
}
],
"notes": [
{
"category": "general",
"text": "An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0544",
"url": "https://www.suse.com/security/cve/CVE-2022-0544"
},
{
"category": "external",
"summary": "SUSE Bug 1195740 for CVE-2022-0544",
"url": "https://bugzilla.suse.com/1195740"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0544"
},
{
"cve": "CVE-2022-0545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0545"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0545",
"url": "https://www.suse.com/security/cve/CVE-2022-0545"
},
{
"category": "external",
"summary": "SUSE Bug 1195739 for CVE-2022-0545",
"url": "https://bugzilla.suse.com/1195739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0545"
},
{
"cve": "CVE-2022-0546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0546"
}
],
"notes": [
{
"category": "general",
"text": "A missing bounds check in the image loader used in Blender 3.x and 2.93.8 leads to out-of-bounds heap access, allowing an attacker to cause denial of service, memory corruption or potentially code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0546",
"url": "https://www.suse.com/security/cve/CVE-2022-0546"
},
{
"category": "external",
"summary": "SUSE Bug 1195738 for CVE-2022-0546",
"url": "https://bugzilla.suse.com/1195738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-cycles-devel-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-demo-3.0.1-2.1.x86_64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.aarch64",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.ppc64le",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.s390x",
"openSUSE Tumbleweed:blender-lang-3.0.1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0546"
}
]
}
OPENSUSE-SU-2025:15755-1
Vulnerability from csaf_opensuse - Published: 2025-11-21 00:00 - Updated: 2025-11-21 00:00Summary
blender-4.5-4.5.4-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: blender-4.5-4.5.4-1.1 on GA media
Description of the patch: These are all security issues fixed in the blender-4.5-4.5.4-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2025-15755
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "blender-4.5-4.5.4-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the blender-4.5-4.5.4-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15755",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15755-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0544 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0546 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0546/"
}
],
"title": "blender-4.5-4.5.4-1.1 on GA media",
"tracking": {
"current_release_date": "2025-11-21T00:00:00Z",
"generator": {
"date": "2025-11-21T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15755-1",
"initial_release_date": "2025-11-21T00:00:00Z",
"revision_history": [
{
"date": "2025-11-21T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "blender-4.5-4.5.4-1.1.aarch64",
"product": {
"name": "blender-4.5-4.5.4-1.1.aarch64",
"product_id": "blender-4.5-4.5.4-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "blender-4.5-demo-4.5.4-1.1.aarch64",
"product": {
"name": "blender-4.5-demo-4.5.4-1.1.aarch64",
"product_id": "blender-4.5-demo-4.5.4-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "blender-4.5-lang-4.5.4-1.1.aarch64",
"product": {
"name": "blender-4.5-lang-4.5.4-1.1.aarch64",
"product_id": "blender-4.5-lang-4.5.4-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-4.5-4.5.4-1.1.ppc64le",
"product": {
"name": "blender-4.5-4.5.4-1.1.ppc64le",
"product_id": "blender-4.5-4.5.4-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "blender-4.5-demo-4.5.4-1.1.ppc64le",
"product": {
"name": "blender-4.5-demo-4.5.4-1.1.ppc64le",
"product_id": "blender-4.5-demo-4.5.4-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "blender-4.5-lang-4.5.4-1.1.ppc64le",
"product": {
"name": "blender-4.5-lang-4.5.4-1.1.ppc64le",
"product_id": "blender-4.5-lang-4.5.4-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-4.5-4.5.4-1.1.s390x",
"product": {
"name": "blender-4.5-4.5.4-1.1.s390x",
"product_id": "blender-4.5-4.5.4-1.1.s390x"
}
},
{
"category": "product_version",
"name": "blender-4.5-demo-4.5.4-1.1.s390x",
"product": {
"name": "blender-4.5-demo-4.5.4-1.1.s390x",
"product_id": "blender-4.5-demo-4.5.4-1.1.s390x"
}
},
{
"category": "product_version",
"name": "blender-4.5-lang-4.5.4-1.1.s390x",
"product": {
"name": "blender-4.5-lang-4.5.4-1.1.s390x",
"product_id": "blender-4.5-lang-4.5.4-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-4.5-4.5.4-1.1.x86_64",
"product": {
"name": "blender-4.5-4.5.4-1.1.x86_64",
"product_id": "blender-4.5-4.5.4-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "blender-4.5-demo-4.5.4-1.1.x86_64",
"product": {
"name": "blender-4.5-demo-4.5.4-1.1.x86_64",
"product_id": "blender-4.5-demo-4.5.4-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "blender-4.5-lang-4.5.4-1.1.x86_64",
"product": {
"name": "blender-4.5-lang-4.5.4-1.1.x86_64",
"product_id": "blender-4.5-lang-4.5.4-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-4.5.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64"
},
"product_reference": "blender-4.5-4.5.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-4.5.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le"
},
"product_reference": "blender-4.5-4.5.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-4.5.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x"
},
"product_reference": "blender-4.5-4.5.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-4.5.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64"
},
"product_reference": "blender-4.5-4.5.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-demo-4.5.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64"
},
"product_reference": "blender-4.5-demo-4.5.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-demo-4.5.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le"
},
"product_reference": "blender-4.5-demo-4.5.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-demo-4.5.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x"
},
"product_reference": "blender-4.5-demo-4.5.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-demo-4.5.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64"
},
"product_reference": "blender-4.5-demo-4.5.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-lang-4.5.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64"
},
"product_reference": "blender-4.5-lang-4.5.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-lang-4.5.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le"
},
"product_reference": "blender-4.5-lang-4.5.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-lang-4.5.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x"
},
"product_reference": "blender-4.5-lang-4.5.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-4.5-lang-4.5.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
},
"product_reference": "blender-4.5-lang-4.5.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-0544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0544"
}
],
"notes": [
{
"category": "general",
"text": "An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0544",
"url": "https://www.suse.com/security/cve/CVE-2022-0544"
},
{
"category": "external",
"summary": "SUSE Bug 1195740 for CVE-2022-0544",
"url": "https://bugzilla.suse.com/1195740"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0544"
},
{
"cve": "CVE-2022-0545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0545"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0545",
"url": "https://www.suse.com/security/cve/CVE-2022-0545"
},
{
"category": "external",
"summary": "SUSE Bug 1195739 for CVE-2022-0545",
"url": "https://bugzilla.suse.com/1195739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0545"
},
{
"cve": "CVE-2022-0546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0546"
}
],
"notes": [
{
"category": "general",
"text": "A missing bounds check in the image loader used in Blender 3.x and 2.93.8 leads to out-of-bounds heap access, allowing an attacker to cause denial of service, memory corruption or potentially code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0546",
"url": "https://www.suse.com/security/cve/CVE-2022-0546"
},
{
"category": "external",
"summary": "SUSE Bug 1195738 for CVE-2022-0546",
"url": "https://bugzilla.suse.com/1195738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-demo-4.5.4-1.1.x86_64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.aarch64",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.ppc64le",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.s390x",
"openSUSE Tumbleweed:blender-4.5-lang-4.5.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0546"
}
]
}
OPENSUSE-SU-2025:15756-1
Vulnerability from csaf_opensuse - Published: 2025-11-21 00:00 - Updated: 2025-11-21 00:00Summary
blender-5.0-5.0.0-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: blender-5.0-5.0.0-1.1 on GA media
Description of the patch: These are all security issues fixed in the blender-5.0-5.0.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2025-15756
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "blender-5.0-5.0.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the blender-5.0-5.0.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15756",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15756-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0544 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0546 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0546/"
}
],
"title": "blender-5.0-5.0.0-1.1 on GA media",
"tracking": {
"current_release_date": "2025-11-21T00:00:00Z",
"generator": {
"date": "2025-11-21T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15756-1",
"initial_release_date": "2025-11-21T00:00:00Z",
"revision_history": [
{
"date": "2025-11-21T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "blender-5.0-5.0.0-1.1.aarch64",
"product": {
"name": "blender-5.0-5.0.0-1.1.aarch64",
"product_id": "blender-5.0-5.0.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "blender-5.0-demo-5.0.0-1.1.aarch64",
"product": {
"name": "blender-5.0-demo-5.0.0-1.1.aarch64",
"product_id": "blender-5.0-demo-5.0.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "blender-5.0-lang-5.0.0-1.1.aarch64",
"product": {
"name": "blender-5.0-lang-5.0.0-1.1.aarch64",
"product_id": "blender-5.0-lang-5.0.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-5.0-5.0.0-1.1.ppc64le",
"product": {
"name": "blender-5.0-5.0.0-1.1.ppc64le",
"product_id": "blender-5.0-5.0.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "blender-5.0-demo-5.0.0-1.1.ppc64le",
"product": {
"name": "blender-5.0-demo-5.0.0-1.1.ppc64le",
"product_id": "blender-5.0-demo-5.0.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "blender-5.0-lang-5.0.0-1.1.ppc64le",
"product": {
"name": "blender-5.0-lang-5.0.0-1.1.ppc64le",
"product_id": "blender-5.0-lang-5.0.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-5.0-5.0.0-1.1.s390x",
"product": {
"name": "blender-5.0-5.0.0-1.1.s390x",
"product_id": "blender-5.0-5.0.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "blender-5.0-demo-5.0.0-1.1.s390x",
"product": {
"name": "blender-5.0-demo-5.0.0-1.1.s390x",
"product_id": "blender-5.0-demo-5.0.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "blender-5.0-lang-5.0.0-1.1.s390x",
"product": {
"name": "blender-5.0-lang-5.0.0-1.1.s390x",
"product_id": "blender-5.0-lang-5.0.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "blender-5.0-5.0.0-1.1.x86_64",
"product": {
"name": "blender-5.0-5.0.0-1.1.x86_64",
"product_id": "blender-5.0-5.0.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "blender-5.0-demo-5.0.0-1.1.x86_64",
"product": {
"name": "blender-5.0-demo-5.0.0-1.1.x86_64",
"product_id": "blender-5.0-demo-5.0.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "blender-5.0-lang-5.0.0-1.1.x86_64",
"product": {
"name": "blender-5.0-lang-5.0.0-1.1.x86_64",
"product_id": "blender-5.0-lang-5.0.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-5.0.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64"
},
"product_reference": "blender-5.0-5.0.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-5.0.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le"
},
"product_reference": "blender-5.0-5.0.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-5.0.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x"
},
"product_reference": "blender-5.0-5.0.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-5.0.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64"
},
"product_reference": "blender-5.0-5.0.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-demo-5.0.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64"
},
"product_reference": "blender-5.0-demo-5.0.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-demo-5.0.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le"
},
"product_reference": "blender-5.0-demo-5.0.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-demo-5.0.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x"
},
"product_reference": "blender-5.0-demo-5.0.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-demo-5.0.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64"
},
"product_reference": "blender-5.0-demo-5.0.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-lang-5.0.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64"
},
"product_reference": "blender-5.0-lang-5.0.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-lang-5.0.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le"
},
"product_reference": "blender-5.0-lang-5.0.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-lang-5.0.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x"
},
"product_reference": "blender-5.0-lang-5.0.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "blender-5.0-lang-5.0.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
},
"product_reference": "blender-5.0-lang-5.0.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-0544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0544"
}
],
"notes": [
{
"category": "general",
"text": "An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0544",
"url": "https://www.suse.com/security/cve/CVE-2022-0544"
},
{
"category": "external",
"summary": "SUSE Bug 1195740 for CVE-2022-0544",
"url": "https://bugzilla.suse.com/1195740"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0544"
},
{
"cve": "CVE-2022-0545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0545"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0545",
"url": "https://www.suse.com/security/cve/CVE-2022-0545"
},
{
"category": "external",
"summary": "SUSE Bug 1195739 for CVE-2022-0545",
"url": "https://bugzilla.suse.com/1195739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0545"
},
{
"cve": "CVE-2022-0546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0546"
}
],
"notes": [
{
"category": "general",
"text": "A missing bounds check in the image loader used in Blender 3.x and 2.93.8 leads to out-of-bounds heap access, allowing an attacker to cause denial of service, memory corruption or potentially code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0546",
"url": "https://www.suse.com/security/cve/CVE-2022-0546"
},
{
"category": "external",
"summary": "SUSE Bug 1195738 for CVE-2022-0546",
"url": "https://bugzilla.suse.com/1195738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-demo-5.0.0-1.1.x86_64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.aarch64",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.ppc64le",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.s390x",
"openSUSE Tumbleweed:blender-5.0-lang-5.0.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0546"
}
]
}
BDU:2022-05850
Vulnerability from fstec - Published: 05.01.2022
VLAI Severity ?
Title
Уязвимость компонента source/blender/imbuf/intern/dds/DirectDrawSurface.cpp набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю получить доступ к конфиденциальным данным
Description
Уязвимость компонента source/blender/imbuf/intern/dds/DirectDrawSurface.cpp набора программного обеспечения для создания трехмерной компьютерной графики Blender связана с некорректным предположением о размере потока. Эксплуатация уязвимости позволяет нарушителю, действующему удаленно, получить доступ к конфиденциальным данным с помощью специально созданного DDS изображения
Severity ?
Vendor
ООО «РусБИТех-Астра», Сообщество свободного программного обеспечения, ООО «Ред Софт», Blender Foundation, АО "НППКТ"
Software Name
Astra Linux Special Edition (запись в едином реестре российских программ №369), Debian GNU/Linux, РЕД ОС (запись в едином реестре российских программ №3751), Blender, ОСОН ОСнова Оnyx (запись в едином реестре российских программ №5913)
Software Version
1.6 «Смоленск» (Astra Linux Special Edition), 10 (Debian GNU/Linux), 11 (Debian GNU/Linux), 7.3 (РЕД ОС), 1.7 (Astra Linux Special Edition), до 2.83.19 (Blender), от 2.90.0 до 2.93.8 (Blender), от 3.0 до 3.1 (Blender), 4.7 (Astra Linux Special Edition), до 2.5.2 (ОСОН ОСнова Оnyx)
Possible Mitigations
Для Blender:
использование рекомендаций производителя: https://developer.blender.org/T94661
Для Debian:
использование рекомендаций производителя: https://security-tracker.debian.org/tracker/CVE-2022-0544
Для ОС Astra Linux:
использование рекомендаций производителя:
https://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47
https://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17
Для ОСОН ОСнова Оnyx:
Обновление программного обеспечения blender до версии 2.79.b+dfsg0-7+deb10u1
Для РедОС: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Для ОС Astra Linux 1.6 «Смоленск»:
обновить пакет blender до 2.79.b+dfsg0-1~deb9u2 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16
Reference
https://developer.blender.org/T94661
https://security-tracker.debian.org/tracker/CVE-2022-0544
https://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47
https://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17
https://поддержка.нппкт.рф/bin/view/ОСнова/Обновления/2.5.2/
http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
https://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16
CWE
CWE-191
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, Blender Foundation, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 10 (Debian GNU/Linux), 11 (Debian GNU/Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 1.7 (Astra Linux Special Edition), \u0434\u043e 2.83.19 (Blender), \u043e\u0442 2.90.0 \u0434\u043e 2.93.8 (Blender), \u043e\u0442 3.0 \u0434\u043e 3.1 (Blender), 4.7 (Astra Linux Special Edition), \u0434\u043e 2.5.2 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f Blender:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://developer.blender.org/T94661\n\n\u0414\u043b\u044f Debian:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://security-tracker.debian.org/tracker/CVE-2022-0544\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f blender \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.79.b+dfsg0-7+deb10u1\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 blender \u0434\u043e 2.79.b+dfsg0-1~deb9u2 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "05.01.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "30.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "21.09.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-05850",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-0544",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Debian GNU/Linux, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Blender, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.5.2 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 source/blender/imbuf/intern/dds/DirectDrawSurface.cpp \u043d\u0430\u0431\u043e\u0440\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0442\u0440\u0435\u0445\u043c\u0435\u0440\u043d\u043e\u0439 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u043d\u043e\u0439 \u0433\u0440\u0430\u0444\u0438\u043a\u0438 Blender, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0426\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u0430\u044f \u043f\u043e\u0442\u0435\u0440\u044f \u0437\u043d\u0430\u0447\u0438\u043c\u043e\u0441\u0442\u0438 (\u043f\u0440\u043e\u0441\u0442\u043e\u0439 \u0438\u043b\u0438 \u0446\u0438\u043a\u043b\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0441\u0434\u0432\u0438\u0433) (CWE-191)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 source/blender/imbuf/intern/dds/DirectDrawSurface.cpp \u043d\u0430\u0431\u043e\u0440\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0442\u0440\u0435\u0445\u043c\u0435\u0440\u043d\u043e\u0439 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u043d\u043e\u0439 \u0433\u0440\u0430\u0444\u0438\u043a\u0438 Blender \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u043c \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0435\u043d\u0438\u0435\u043c \u043e \u0440\u0430\u0437\u043c\u0435\u0440\u0435 \u043f\u043e\u0442\u043e\u043a\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e DDS \u0438\u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://developer.blender.org/T94661\nhttps://security-tracker.debian.org/tracker/CVE-2022-0544\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.5.2/\nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-191",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)"
}
GHSA-VCG5-3355-6JF2
Vulnerability from github – Published: 2022-02-25 00:00 – Updated: 2022-06-30 00:00
VLAI?
Details
An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2022-0544"
],
"database_specific": {
"cwe_ids": [
"CWE-191"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-02-24T19:15:00Z",
"severity": "MODERATE"
},
"details": "An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.",
"id": "GHSA-vcg5-3355-6jf2",
"modified": "2022-06-30T00:00:42Z",
"published": "2022-02-25T00:00:58Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0544"
},
{
"type": "WEB",
"url": "https://developer.blender.org/T94661"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2022/dsa-5176"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2022-0544
Vulnerability from fkie_nvd - Published: 2022-02-24 19:15 - Updated: 2024-11-21 06:38
Severity ?
Summary
An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.
References
| URL | Tags | ||
|---|---|---|---|
| patrick@puiterwijk.org | https://developer.blender.org/T94661 | ||
| patrick@puiterwijk.org | https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html | ||
| patrick@puiterwijk.org | https://www.debian.org/security/2022/dsa-5176 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://developer.blender.org/T94661 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5176 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| blender | blender | * | |
| blender | blender | * | |
| blender | blender | * | |
| debian | debian_linux | 9.0 | |
| debian | debian_linux | 10.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "991AC87F-A637-42E2-ADDE-CAFBBD158A8A",
"versionEndExcluding": "2.83.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A9A6568C-F50D-4D37-B285-D75AB53362BE",
"versionEndExcluding": "2.93.8",
"versionStartIncluding": "2.90.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:blender:blender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9CBA54F2-2674-4575-A98E-D5474339A94E",
"versionEndExcluding": "3.1",
"versionStartIncluding": "3.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1."
},
{
"lang": "es",
"value": "Un desbordamiento de enteros en el cargador DDS de Blender conlleva a una lectura fuera de l\u00edmites, permitiendo posiblemente a un atacante leer datos confidenciales usando un archivo de imagen DDS dise\u00f1ado. Este fallo afecta a Blender versiones anteriores a 2.83.19, 2.93.8 y 3.1"
}
],
"id": "CVE-2022-0544",
"lastModified": "2024-11-21T06:38:53.007",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-02-24T19:15:09.713",
"references": [
{
"source": "patrick@puiterwijk.org",
"url": "https://developer.blender.org/T94661"
},
{
"source": "patrick@puiterwijk.org",
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html"
},
{
"source": "patrick@puiterwijk.org",
"url": "https://www.debian.org/security/2022/dsa-5176"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://developer.blender.org/T94661"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.debian.org/security/2022/dsa-5176"
}
],
"sourceIdentifier": "patrick@puiterwijk.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-191"
}
],
"source": "patrick@puiterwijk.org",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-191"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…