Some security issues have been discovered in Blender, which can be exploited by malicious, local users to disclose potentially sensitive information and perform certain actions with escalated privileges.
The security issues are caused due to Blender handling temporary files in an insecure manner (e.g. creating "/tmp/quit.blend" when quitting Blender, using easy to guess file names and insecure file permissions to store temporary render frames, and insecure file permission when auto saving files). This can be exploited to e.g. conduct symlink attacks and overwrite arbitrary files with the permissions of the user running Blender or disclose potentially sensitive information.
The security issues are confirmed in version 2.45 on a Linux system. Other versions may also be affected.
Solution: Restrict access to trusted users.
Provided and/or discovered by: Independently discovered by various persons.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org