-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2026-0e8fe3c8a3 2026-01-26 01:06:41.638956+00:00 --------------------------------------------------------------------------------
Name : mingw-openexr Product : Fedora 42 Version : 3.3.6 Release : 1.fc42 URL : http://www.openexr.com/ Summary : MinGW Windows openexr library Description : MinGW Windows openexr library. -------------------------------------------------------------------------------- Update Information: Update to openexr-3.3.6, fixes multiple security issues. -------------------------------------------------------------------------------- ChangeLog: * Sat Jan 17 2026 Sandro Mani <[email protected]> - 3.3.6-1 - Update to 3.3.6 * Sun Aug 10 2025 Sandro Mani <[email protected]> - 3.3.5-2 - Rebuild (imath) * Sun Jul 27 2025 Sandro Mani <[email protected]> - 3.3.5-1 - Update to 3.3.5 * Thu Jul 24 2025 Fedora Release Engineering <[email protected]> - 3.3.4-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_43_Mass_Rebuild * Mon Jun 9 2025 Sandro Mani <[email protected]> - 3.3.4-1 - Update to 3.3.4 * Fri Mar 28 2025 Sandro Mani <[email protected]> - 3.3.3-1 - Update to 3.3.3 -------------------------------------------------------------------------------- References: [ 1 ] Bug #2417239 - CVE-2025-64183 mingw-openexr: use after free in PyObject_StealAttrString [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2417239 [ 2 ] Bug #2417242 - CVE-2025-64183 mingw-openexr: use after free in PyObject_StealAttrString [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2417242 [ 3 ] Bug #2417985 - CVE-2025-64182 mingw-openexr: buffer overflow in PyOpenEXR_old's channels() and channel() [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2417985 [ 4 ] Bug #2417987 - CVE-2025-64182 mingw-openexr: buffer overflow in PyOpenEXR_old's channels() and channel() [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2417987 [ 5 ] Bug #2418247 - CVE-2025-64181 mingw-openexr: Use of Uninitialized Memory inside generic_unpack [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2418247 [ 6 ] Bug #2418249 - CVE-2025-64181 mingw-openexr: Use of Uninitialized Memory inside generic_unpack [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2418249 [ 7 ] Bug #2424903 - CVE-2025-12839 mingw-openexr: OpenEXR: Remote Code Execution via Heap-based Buffer Overflow in EXR File Parsing [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2424903 [ 8 ] Bug #2424904 - CVE-2025-12840 mingw-openexr: OpenEXR: Remote Code Execution via EXR file parsing heap-based buffer overflow [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2424904 [ 9 ] Bug #2424908 - CVE-2025-12495 mingw-openexr: OpenEXR: Remote Code Execution via malicious EXR file parsing [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2424908 [ 10 ] Bug #2424913 - CVE-2025-12839 mingw-openexr: OpenEXR: Remote Code Execution via Heap-based Buffer Overflow in EXR File Parsing [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2424913 [ 11 ] Bug #2424915 - CVE-2025-12840 mingw-openexr: OpenEXR: Remote Code Execution via EXR file parsing heap-based buffer overflow [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2424915 [ 12 ] Bug #2424920 - CVE-2025-12495 mingw-openexr: OpenEXR: Remote Code Execution via malicious EXR file parsing [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2424920 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2026-0e8fe3c8a3' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- -- _______________________________________________ package-announce mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/[email protected] Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
