<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2025-3159</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2025-3159</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>3</Number>
        <Date>2025-08-13T23:34:25Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-04-04T23:14:50Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-08-13T23:34:25Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2025-3159</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASE::Parser::ParseLV4MeshBonesVertices of the file code/AssetLib/ASE/ASEParser.cpp of the component ASE File Handler. The manipulation leads to heap-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is e8a6286542924e628e02749c4f5ac4f91fdae71b. It is recommended to apply a patch to fix this issue.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001904.html</URL>
      <Description>E-Mail link for RHSA-2025:12842</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Liberty Linux 9">
      <Branch Type="Product Name" Name="SUSE Liberty Linux 9">
        <FullProductName ProductID="SUSE Liberty Linux 9" CPE="cpe:/o:suse:sll:9">SUSE Liberty Linux 9</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="assimp-devel-6.0.1-1.1">
      <FullProductName ProductID="assimp-devel-6.0.1-1.1">assimp-devel-6.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libassimp5-6.0.1-1.1">
      <FullProductName ProductID="libassimp5-6.0.1-1.1">libassimp5-6.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qt5-qt3d-5.15.9-2.el9_6">
      <FullProductName ProductID="qt5-qt3d-5.15.9-2.el9_6">qt5-qt3d-5.15.9-2.el9_6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qt5-qt3d-devel-5.15.9-2.el9_6">
      <FullProductName ProductID="qt5-qt3d-devel-5.15.9-2.el9_6">qt5-qt3d-devel-5.15.9-2.el9_6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qt5-qt3d-examples-5.15.9-2.el9_6">
      <FullProductName ProductID="qt5-qt3d-examples-5.15.9-2.el9_6">qt5-qt3d-examples-5.15.9-2.el9_6</FullProductName>
    </Branch>
    <Relationship ProductReference="qt5-qt3d-5.15.9-2.el9_6" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 9">
      <FullProductName ProductID="SUSE Liberty Linux 9:qt5-qt3d-5.15.9-2.el9_6">qt5-qt3d-5.15.9-2.el9_6 as a component of SUSE Liberty Linux 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="qt5-qt3d-devel-5.15.9-2.el9_6" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 9">
      <FullProductName ProductID="SUSE Liberty Linux 9:qt5-qt3d-devel-5.15.9-2.el9_6">qt5-qt3d-devel-5.15.9-2.el9_6 as a component of SUSE Liberty Linux 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="qt5-qt3d-examples-5.15.9-2.el9_6" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 9">
      <FullProductName ProductID="SUSE Liberty Linux 9:qt5-qt3d-examples-5.15.9-2.el9_6">qt5-qt3d-examples-5.15.9-2.el9_6 as a component of SUSE Liberty Linux 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="assimp-devel-6.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:assimp-devel-6.0.1-1.1">assimp-devel-6.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libassimp5-6.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libassimp5-6.0.1-1.1">libassimp5-6.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASE::Parser::ParseLV4MeshBonesVertices of the file code/AssetLib/ASE/ASEParser.cpp of the component ASE File Handler. The manipulation leads to heap-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is e8a6286542924e628e02749c4f5ac4f91fdae71b. It is recommended to apply a patch to fix this issue.</Note>
    </Notes>
    <CVE>CVE-2025-3159</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Liberty Linux 9:qt5-qt3d-5.15.9-2.el9_6</ProductID>
        <ProductID>SUSE Liberty Linux 9:qt5-qt3d-devel-5.15.9-2.el9_6</ProductID>
        <ProductID>SUSE Liberty Linux 9:qt5-qt3d-examples-5.15.9-2.el9_6</ProductID>
        <ProductID>openSUSE Tumbleweed:assimp-devel-6.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libassimp5-6.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>5.3</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
