CVE-2017-2908

NameCVE-2017-2908
DescriptionAn exploitable integer overflow exists in the thumbnail functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to render the thumbnail for the file while in the File->Open dialog.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1465-1, DSA-4248-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
blender (PTS)bullseye (security), bullseye2.83.5+dfsg-5+deb11u1fixed
bookworm3.4.1+dfsg-2fixed
sid4.3.0+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
blendersourcejessie2.72.b+dfsg0-3+deb8u1DLA-1465-1
blendersourcestretch2.79.b+dfsg0-1~deb9u1DSA-4248-1
blendersource(unstable)2.79.a+dfsg0-1

Notes

[wheezy] - blender <ignored> (Vulnerable but not ignored)
https://git.blender.org/gitweb/gitweb.cgi/blender.git/commit/07aed404cfb2759f97c60b9f64d8a9392dabaf1a
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0415

Search for package or bug name: Reporting problems