Fedora 32: mingw-OpenEXR 2020-a9a0f8f6cd
Fedora 32: mingw-OpenEXR 2020-a9a0f8f6cd
Backport patches for CVE-2020-15306, CVE-2020-15305, CVE-2020-15304
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2020-a9a0f8f6cd 2020-07-11 01:08:04.979716 -------------------------------------------------------------------------------- Name : mingw-OpenEXR Product : Fedora 32 Version : 2.4.1 Release : 2.fc32 URL : https://www.openexr.com/ Summary : MinGW Windows OpenEXR library Description : MinGW Windows OpenEXR library. -------------------------------------------------------------------------------- Update Information: Backport patches for CVE-2020-15306, CVE-2020-15305, CVE-2020-15304 -------------------------------------------------------------------------------- ChangeLog: * Wed Jul 1 2020 Sandro Mani- 2.4.1-2 - Backport patches for CVE-2020-15306, CVE-2020-15305, CVE-2020-15304 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1852007 - CVE-2020-15306 mingw-OpenEXR: OpenEXR: Invalid chunkCount attributes could cause a heap buffer overflow in getChunkOffsetTableSize() in IlmImf/ImfMisc.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1852007 [ 2 ] Bug #1852013 - CVE-2020-15305 mingw-OpenEXR: OpenEXR: Invalid input could cause a use-after-free in DeepScanLineInputFile::DeepScanLineInputFile() in IlmImf/ImfDeepScanLineInputFile.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1852013 [ 3 ] Bug #1852017 - CVE-2020-15304 mingw-OpenEXR: OpenEXR: An invalid tiled input file could cause invalid memory access in TiledInputFile::TiledInputFile() in IlmImf/ImfTiledInputFile.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1852017 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2020-a9a0f8f6cd' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it. To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it. Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it.