--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-1fbf91067c
2026-01-27 04:51:32.146746+00:00
--------------------------------------------------------------------------------

Name        : mingw-openexr
Product     : Fedora 43
Version     : 3.3.6
Release     : 1.fc43
URL         : http://www.openexr.com/
Summary     : MinGW Windows openexr library
Description :
MinGW Windows openexr library.

--------------------------------------------------------------------------------
Update Information:

Update to openexr-3.3.6, fixes multiple security issues.
--------------------------------------------------------------------------------
ChangeLog:

* Sat Jan 17 2026 Sandro Mani <[email protected]> - 3.3.6-1
- Update to 3.3.6
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2417239 - CVE-2025-64183 mingw-openexr: use after free in 
PyObject_StealAttrString [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2417239
  [ 2 ] Bug #2417242 - CVE-2025-64183 mingw-openexr: use after free in 
PyObject_StealAttrString [fedora-43]
        https://bugzilla.redhat.com/show_bug.cgi?id=2417242
  [ 3 ] Bug #2417985 - CVE-2025-64182 mingw-openexr: buffer overflow in 
PyOpenEXR_old's channels() and channel() [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2417985
  [ 4 ] Bug #2417987 - CVE-2025-64182 mingw-openexr: buffer overflow in 
PyOpenEXR_old's channels() and channel() [fedora-43]
        https://bugzilla.redhat.com/show_bug.cgi?id=2417987
  [ 5 ] Bug #2418247 - CVE-2025-64181 mingw-openexr: Use of Uninitialized 
Memory inside generic_unpack [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2418247
  [ 6 ] Bug #2418249 - CVE-2025-64181 mingw-openexr: Use of Uninitialized 
Memory inside generic_unpack [fedora-43]
        https://bugzilla.redhat.com/show_bug.cgi?id=2418249
  [ 7 ] Bug #2424903 - CVE-2025-12839 mingw-openexr: OpenEXR: Remote Code 
Execution via Heap-based Buffer Overflow in EXR File Parsing [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2424903
  [ 8 ] Bug #2424904 - CVE-2025-12840 mingw-openexr: OpenEXR: Remote Code 
Execution via EXR file parsing heap-based buffer overflow [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2424904
  [ 9 ] Bug #2424908 - CVE-2025-12495 mingw-openexr: OpenEXR: Remote Code 
Execution via malicious EXR file parsing [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2424908
  [ 10 ] Bug #2424913 - CVE-2025-12839 mingw-openexr: OpenEXR: Remote Code 
Execution via Heap-based Buffer Overflow in EXR File Parsing [fedora-43]
        https://bugzilla.redhat.com/show_bug.cgi?id=2424913
  [ 11 ] Bug #2424915 - CVE-2025-12840 mingw-openexr: OpenEXR: Remote Code 
Execution via EXR file parsing heap-based buffer overflow [fedora-43]
        https://bugzilla.redhat.com/show_bug.cgi?id=2424915
  [ 12 ] Bug #2424920 - CVE-2025-12495 mingw-openexr: OpenEXR: Remote Code 
Execution via malicious EXR file parsing [fedora-43]
        https://bugzilla.redhat.com/show_bug.cgi?id=2424920
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-1fbf91067c' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------

-- 
_______________________________________________
package-announce mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://forge.fedoraproject.org/infra/tickets/issues/new

Reply via email to