First published: Thu Feb 24 2022(Updated: )
An integer underflow in the DDS loader of Blender leads to an out-of-bounds read, possibly allowing an attacker to read sensitive data using a crafted DDS image file. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
Blender Blender | <2.83.19 | |
Blender Blender | >=2.90.0<2.93.8 | |
Blender Blender | >=3.0<3.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/blender | 2.79.b+dfsg0-7+deb10u1 2.83.5+dfsg-5+deb11u1 3.4.1+dfsg-2 3.6.2+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0544 is a vulnerability in Blender that allows an attacker to read sensitive data using a crafted DDS image file.
Blender versions prior to 2.83.19, 2.93.8, and 3.1 are affected by CVE-2022-0544.
An attacker can exploit CVE-2022-0544 by using a crafted DDS image file to trigger an integer underflow in the DDS loader of Blender, leading to an out-of-bounds read and the potential for reading sensitive data.
CVE-2022-0544 has a severity score of 5.5, which is considered medium.
To fix CVE-2022-0544, you should update Blender to version 2.83.19, 2.93.8, or 3.1 or apply the corresponding security patches provided by the Blender project or your Linux distribution.