<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for assimp</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:0113-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-04-02T16:31:31Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-04-02T16:31:31Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-04-02T16:31:31Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for assimp</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for assimp fixes the following issues:

- CVE-2024-48425: Fixed SEGV in Assimp:SplitLargeMeshesProcess_Triangle:UpdateNode (boo#1232324)
- CVE-2024-48423: Fixed a arbitrary code execution via CallbackToLogRedirector() (boo#1232322)
- CVE-2024-48424: Fixed a heap-buffer-overflow in OpenDDLParser:parseStructure() (boo#1232323)
- CVE-2024-53425: Fixed a heap-based buffer overflow in SkipSpacesAndLineEnd() (boo#1233633)
- CVE-2025-2592: Fixed a heap-based buffer overflow in Assimp::CSMImporter::InternReadFile() (boo#1239916)
- CVE-2025-3015: Fixed out-of-bounds read caused by manipulation of the argument mIndices (boo#1240412)
- CVE-2025-3016: Fixed a denial of service caused by manipulation of the argument mWidth/mHeight (boo#1240413)
- CVE-2025-2591: Fixed a denial of service in code/AssetLib/MDL/MDLLoader.cpp (boo#1239920)
- CVE-2025-2151: Fixed a stack-based buffer overflow in Assimp::GetNextLine() (boo#1239220)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2025-113</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUXUVZ7SBZK5ZFR45B223UXCWUMD4XQD/</URL>
      <Description>E-Mail link for openSUSE-SU-2025:0113-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232322</URL>
      <Description>SUSE Bug 1232322</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232323</URL>
      <Description>SUSE Bug 1232323</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232324</URL>
      <Description>SUSE Bug 1232324</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233633</URL>
      <Description>SUSE Bug 1233633</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239220</URL>
      <Description>SUSE Bug 1239220</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239916</URL>
      <Description>SUSE Bug 1239916</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239920</URL>
      <Description>SUSE Bug 1239920</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240412</URL>
      <Description>SUSE Bug 1240412</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240413</URL>
      <Description>SUSE Bug 1240413</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-48423/</URL>
      <Description>SUSE CVE CVE-2024-48423 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-48424/</URL>
      <Description>SUSE CVE CVE-2024-48424 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-48425/</URL>
      <Description>SUSE CVE CVE-2024-48425 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53425/</URL>
      <Description>SUSE CVE CVE-2024-53425 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-2151/</URL>
      <Description>SUSE CVE CVE-2025-2151 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-2591/</URL>
      <Description>SUSE CVE CVE-2025-2591 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-2592/</URL>
      <Description>SUSE CVE CVE-2025-2592 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-3015/</URL>
      <Description>SUSE CVE CVE-2025-3015 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-3016/</URL>
      <Description>SUSE CVE CVE-2025-3016 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP6">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP6">
        <FullProductName ProductID="SUSE Package Hub 15 SP6">SUSE Package Hub 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="assimp-devel-5.3.1-bp156.3.9.1">
      <FullProductName ProductID="assimp-devel-5.3.1-bp156.3.9.1">assimp-devel-5.3.1-bp156.3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libassimp5-5.3.1-bp156.3.9.1">
      <FullProductName ProductID="libassimp5-5.3.1-bp156.3.9.1">libassimp5-5.3.1-bp156.3.9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="assimp-devel-5.3.1-bp156.3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Package Hub 15 SP6:assimp-devel-5.3.1-bp156.3.9.1">assimp-devel-5.3.1-bp156.3.9.1 as a component of SUSE Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libassimp5-5.3.1-bp156.3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Package Hub 15 SP6:libassimp5-5.3.1-bp156.3.9.1">libassimp5-5.3.1-bp156.3.9.1 as a component of SUSE Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="assimp-devel-5.3.1-bp156.3.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:assimp-devel-5.3.1-bp156.3.9.1">assimp-devel-5.3.1-bp156.3.9.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libassimp5-5.3.1-bp156.3.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:libassimp5-5.3.1-bp156.3.9.1">libassimp5-5.3.1-bp156.3.9.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue in assimp v.5.4.3 allows a local attacker to execute arbitrary code via the CallbackToLogRedirector function within the Assimp library.</Note>
    </Notes>
    <CVE>CVE-2024-48423</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUXUVZ7SBZK5ZFR45B223UXCWUMD4XQD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-48423.html</URL>
        <Description>CVE-2024-48423</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232322</URL>
        <Description>SUSE Bug 1232322</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-buffer-overflow vulnerability has been identified in the OpenDDLParser::parseStructure function within the Assimp library, specifically during the processing of OpenGEX files.</Note>
    </Notes>
    <CVE>CVE-2024-48424</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUXUVZ7SBZK5ZFR45B223UXCWUMD4XQD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-48424.html</URL>
        <Description>CVE-2024-48424</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232323</URL>
        <Description>SUSE Bug 1232323</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2024-48425</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUXUVZ7SBZK5ZFR45B223UXCWUMD4XQD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-48425.html</URL>
        <Description>CVE-2024-48425</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232324</URL>
        <Description>SUSE Bug 1232324</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-buffer-overflow vulnerability was discovered in the SkipSpacesAndLineEnd function in Assimp v5.4.3. This issue occurs when processing certain malformed MD5 model files, leading to an out-of-bounds read and potential application crash.</Note>
    </Notes>
    <CVE>CVE-2024-53425</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUXUVZ7SBZK5ZFR45B223UXCWUMD4XQD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53425.html</URL>
        <Description>CVE-2024-53425</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233633</URL>
        <Description>SUSE Bug 1233633</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability classified as critical was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::GetNextLine in the library ParsingUtils.h of the component File Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.</Note>
    </Notes>
    <CVE>CVE-2025-2151</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUXUVZ7SBZK5ZFR45B223UXCWUMD4XQD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-2151.html</URL>
        <Description>CVE-2025-2151</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1239220</URL>
        <Description>SUSE Bug 1239220</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability classified as problematic was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function MDLImporter::InternReadFile_Quake1 of the file code/AssetLib/MDL/MDLLoader.cpp. The manipulation of the argument skinwidth/skinheight leads to divide by zero. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is identified as ab66a1674fcfac87aaba4c8b900b315ebc3e7dbd. It is recommended to apply a patch to fix this issue.</Note>
    </Notes>
    <CVE>CVE-2025-2591</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUXUVZ7SBZK5ZFR45B223UXCWUMD4XQD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-2591.html</URL>
        <Description>CVE-2025-2591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1239919</URL>
        <Description>SUSE Bug 1239919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability, which was classified as critical, has been found in Open Asset Import Library Assimp 5.4.3. This issue affects the function CSMImporter::InternReadFile of the file code/AssetLib/CSM/CSMLoader.cpp. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named 2690e354da0c681db000cfd892a55226788f2743. It is recommended to apply a patch to fix this issue.</Note>
    </Notes>
    <CVE>CVE-2025-2592</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUXUVZ7SBZK5ZFR45B223UXCWUMD4XQD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-2592.html</URL>
        <Description>CVE-2025-2592</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1239914</URL>
        <Description>SUSE Bug 1239914</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability classified as critical has been found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASEImporter::BuildUniqueRepresentation of the file code/AssetLib/ASE/ASELoader.cpp of the component ASE File Handler. The manipulation of the argument mIndices leads to out-of-bounds read. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0 is able to address this issue. The patch is named 7c705fde418d68cca4e8eff56be01b2617b0d6fe. It is recommended to apply a patch to fix this issue.</Note>
    </Notes>
    <CVE>CVE-2025-3015</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUXUVZ7SBZK5ZFR45B223UXCWUMD4XQD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-3015.html</URL>
        <Description>CVE-2025-3015</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240412</URL>
        <Description>SUSE Bug 1240412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability classified as problematic was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::MDLImporter::ParseTextureColorData of the file code/AssetLib/MDL/MDLMaterialLoader.cpp of the component MDL File Handler. The manipulation of the argument mWidth/mHeight leads to resource consumption. The attack can be initiated remotely. Upgrading to version 6.0 is able to address this issue. The name of the patch is 5d2a7482312db2e866439a8c05a07ce1e718bed1. It is recommended to apply a patch to fix this issue.</Note>
    </Notes>
    <CVE>CVE-2025-3016</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:assimp-devel-5.3.1-bp156.3.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libassimp5-5.3.1-bp156.3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUXUVZ7SBZK5ZFR45B223UXCWUMD4XQD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-3016.html</URL>
        <Description>CVE-2025-3016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240413</URL>
        <Description>SUSE Bug 1240413</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
