Fedora Linux 8563 Published by

A mingw-OpenEXR security update has been released for Fedora 32.



SECURITY: Fedora 32 Update: mingw-OpenEXR-2.4.1-2.fc32


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2020-a9a0f8f6cd
2020-07-11 01:08:04.979716
--------------------------------------------------------------------------------

Name : mingw-OpenEXR
Product : Fedora 32
Version : 2.4.1
Release : 2.fc32
URL :   http://www.openexr.com/
Summary : MinGW Windows OpenEXR library
Description :
MinGW Windows OpenEXR library.

--------------------------------------------------------------------------------
Update Information:

Backport patches for CVE-2020-15306, CVE-2020-15305, CVE-2020-15304
--------------------------------------------------------------------------------
ChangeLog:

* Wed Jul 1 2020 Sandro Mani - 2.4.1-2
- Backport patches for CVE-2020-15306, CVE-2020-15305, CVE-2020-15304
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #1852007 - CVE-2020-15306 mingw-OpenEXR: OpenEXR: Invalid chunkCount attributes could cause a heap buffer overflow in getChunkOffsetTableSize() in IlmImf/ImfMisc.cpp [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1852007
[ 2 ] Bug #1852013 - CVE-2020-15305 mingw-OpenEXR: OpenEXR: Invalid input could cause a use-after-free in DeepScanLineInputFile::DeepScanLineInputFile() in IlmImf/ImfDeepScanLineInputFile.cpp [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1852013
[ 3 ] Bug #1852017 - CVE-2020-15304 mingw-OpenEXR: OpenEXR: An invalid tiled input file could cause invalid memory access in TiledInputFile::TiledInputFile() in IlmImf/ImfTiledInputFile.cpp [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1852017
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2020-a9a0f8f6cd' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys