Source: assimp
Version: 5.4.3+ds-2
Severity: important
Tags: security upstream
Forwarded:
https://github.com/assimp/assimp/issues/6019
X-Debbugs-Cc:
carnil@debian.org, Debian Security Team <
team@security.debian.org>
Hi,
The following vulnerability was published for assimp.
CVE-2025-2757[0]:
| A vulnerability classified as critical was found in Open Asset
| Import Library Assimp 5.4.3. This vulnerability affects the function
| AI_MD5_PARSE_STRING_IN_QUOTATION of the file
| code/AssetLib/MD5/MD5Parser.cpp of the component MD5 File Handler.
| The manipulation of the argument data leads to heap-based buffer
| overflow. The attack can be initiated remotely. The exploit has been
| disclosed to the public and may be used.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0]
https://security-tracker.debian.org/tracker/CVE-2025-2757
https://www.cve.org/CVERecord?id=CVE-2025-2757
[1]
https://github.com/assimp/assimp/issues/6019
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)