** Changed in: gentoo
Status: Unknown => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/222592
Title:
[CVE-2008-1102] Blender imb_loadhdr() buffer overflow
To manage notification
Launchpad has imported 18 comments from the remote bug at
https://bugs.gentoo.org/show_bug.cgi?id=219008.
If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.la
** Changed in: gentoo
Importance: Unknown => Medium
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/222592
Title:
[CVE-2008-1102] Blender imb_loadhdr() buffer overflow
--
ubuntu-bugs mailing list
** Branch linked: lp:ubuntu/dapper-updates/blender
** Branch linked: lp:~ubuntu-branches/ubuntu/gutsy/blender/gutsy-
security
** Branch linked: lp:ubuntu/hardy-updates/blender
--
[CVE-2008-1102] Blender imb_loadhdr() buffer overflow
https://bugs.launchpad.net/bugs/222592
You received this bug n
This bug was fixed in the package blender - 2.45-4ubuntu1.1
---
blender (2.45-4ubuntu1.1) hardy-security; urgency=low
* SECURITY UPDATE: Stack-based buffer overflow in the imb_loadhdr
function in Blender 2.45 allows user-assisted remote attackers
to execute arbitrary code vi
This bug was fixed in the package blender - 2.44-2ubuntu2.1
---
blender (2.44-2ubuntu2.1) gutsy-security; urgency=low
* SECURITY UPDATE: Stack-based buffer overflow in the imb_loadhdr
function in Blender 2.45 allows user-assisted remote attackers
to execute arbitrary code vi
** Attachment added: "build-gutsy"
http://launchpadlibrarian.net/21514055/build-gutsy
** Changed in: blender (Ubuntu Gutsy)
Status: Confirmed => In Progress
** Changed in: blender (Ubuntu Hardy)
Status: Confirmed => In Progress
--
[CVE-2008-1102] Blender imb_loadhdr() buffer o
** Attachment added: "debdiff-gutsy"
http://launchpadlibrarian.net/21513887/debdiff-gutsy
--
[CVE-2008-1102] Blender imb_loadhdr() buffer overflow
https://bugs.launchpad.net/bugs/222592
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Attachment added: "build-hardy"
http://launchpadlibrarian.net/21513692/build-hardy
--
[CVE-2008-1102] Blender imb_loadhdr() buffer overflow
https://bugs.launchpad.net/bugs/222592
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
** Attachment added: "debdiff-hardy"
http://launchpadlibrarian.net/21513679/debdiff-hardy
--
[CVE-2008-1102] Blender imb_loadhdr() buffer overflow
https://bugs.launchpad.net/bugs/222592
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Update was released to fix this issue:
http://www.ubuntu.com/usn/usn-699-1
** Changed in: blender (Ubuntu Gutsy)
Status: New => Confirmed
** Changed in: blender (Ubuntu Hardy)
Status: New => Confirmed
** Changed in: blender (Ubuntu Jaunty)
Status: Triaged => Invalid
** Chan
I've just merged 2.45-5 from Debian unstable, which addresses this.
Unfortunately, I've not used "-v" for dpkg-buildpackage, so here's the Debian
changelog snippet for reference:
* Fix CVE-2008-1102: “Stack-based buffer overflow in the imb_loadhdr
function allows user-assisted remote attac
** Changed in: gentoo
Status: Fix Released => Confirmed
--
[CVE-2008-1102] Blender imb_loadhdr() buffer overflow
https://bugs.launchpad.net/bugs/222592
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
u
** Changed in: gentoo
Status: Unknown => Fix Released
--
[CVE-2008-1102] Blender imb_loadhdr() buffer overflow
https://bugs.launchpad.net/bugs/222592
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubu
** Bug watch added: Gentoo Bugzilla #219008
http://bugs.gentoo.org/show_bug.cgi?id=219008
** Also affects: gentoo via
http://bugs.gentoo.org/show_bug.cgi?id=219008
Importance: Unknown
Status: Unknown
--
[CVE-2008-1102] Blender imb_loadhdr() buffer overflow
https://bugs.launchpad.
Sorry, I just tend to group CVEs as I find them in various security
advisories. It's not always easy to figure out which ones belong
together, especially if you try to report a greater amount of
accumulated bugs in a limit period of time.
--
[CVE-2008-1102] Blender imb_loadhdr() buffer overflow
h
CVE-2008-1103 is a separate set of problems and is best tracked in
another bug report. I asked in the comments whether bug #6671 was the
same problem as CVE-2008-1103 but received no reply. I have just filed
bug #227345 to track CVE-2008-1103.
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cven
SUSE-SR:2008:010 also mentions CVE-2008-1103:
»Multiple unspecified vulnerabilities in Blender have unknown impact and attack
vectors, related to "temporary file issues."«
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-1103
--
[CVE-2008-1102] Blender imb_loadhdr() buffer
** Changed in: blender (Debian)
Status: Unknown => Fix Released
--
[CVE-2008-1102] Blender imb_loadhdr() buffer overflow
https://bugs.launchpad.net/bugs/222592
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailin
** Bug watch added: Debian Bug tracker #477808
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=477808
** Also affects: blender (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=477808
Importance: Unknown
Status: Unknown
** Changed in: blender (Ubuntu)
Status: N
This has been fixed in Debian, see
http://www.debian.org/security/2008/dsa-1567
--
[CVE-2008-1102] Blender imb_loadhdr() buffer overflow
https://bugs.launchpad.net/bugs/222592
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bu
21 matches
Mail list logo