Vulnerability Description
An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Blender | Blender | < 2.83.19 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://developer.blender.org/T94629Issue TrackingPatchVendor Advisory
- https://lists.debian.org/debian-lts-announce/2022/06/msg00021.htmlMailing ListThird Party Advisory
- https://www.debian.org/security/2022/dsa-5176Third Party Advisory
- https://developer.blender.org/T94629Issue TrackingPatchVendor Advisory
- https://lists.debian.org/debian-lts-announce/2022/06/msg00021.htmlMailing ListThird Party Advisory
- https://www.debian.org/security/2022/dsa-5176Third Party Advisory
FAQ
What is CVE-2022-0545?
CVE-2022-0545 is a vulnerability with a CVSS score of 7.8 (HIGH). An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achie...
How severe is CVE-2022-0545?
CVE-2022-0545 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0545?
Check the references section above for vendor advisories and patch information. Affected products include: Blender Blender, Debian Debian Linux.