[SECURITY] [DLA 3060-1] blender security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3060-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Thorsten Alteholz
June 27, 2022 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : blender
Version : 2.79.b+dfsg0-1~deb9u2
CVE ID : CVE-2022-0544 CVE-2022-0545 CVE-2022-0546
Several issues have been found in blender, a very fast and versatile 3D
modeller/renderer.
CVE-2022-0546
An out-of-bounds heap access due to missing checks in the image
loader could result in denial of service, memory corruption or
potentially code execution.
CVE-2022-0545
An integer overflow while processing 2d images might result in a
write-what-where vulnerability or an out-of-bounds read vulnerability
which could leak sensitive information or achieve code execution.
CVE-2022-0544
Crafted DDS image files could create an integer underflow in the
DDS loader which leads to an out-of-bounds read and might leak
sensitive information.
For Debian 9 stretch, these problems have been fixed in version
2.79.b+dfsg0-1~deb9u2.
We recommend that you upgrade your blender packages.
For the detailed security status of blender please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/blender
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----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=syMW
-----END PGP SIGNATURE-----
Reply to: