Mehrere Probleme in mingw-OpenEXR
ID: | FEDORA-2018-f5d2f4ec0d |
Distribution: | Fedora |
Plattformen: | Fedora 26 |
Datum: | Di, 27. Februar 2018, 18:54 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12596 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9110 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9111 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9115 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9116 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9113 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9112 |
Applikationen: | OpenEXR |
Originalnachricht |
|
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2018-f5d2f4ec0d 2018-02-27 16:51:55.487126 -------------------------------------------------------------------------------- Name : mingw-OpenEXR Product : Fedora 26 Version : 2.2.0 Release : 6.fc26 URL : http://www.openexr.com/ Summary : MinGW Windows OpenEXR library Description : MinGW Windows OpenEXR library. -------------------------------------------------------------------------------- Update Information: This update fixes the following vulnerabilities: CVE-2017-9110 CVE-2017-9111 CVE-2017-9112 CVE-2017-9113 CVE-2017-9114 CVE-2017-9115 CVE-2017-9116 CVE-2017-12596 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1483880 - CVE-2017-12596 OpenEXR: heap-based buffer over-read in hufDecode function https://bugzilla.redhat.com/show_bug.cgi?id=1483880 [ 2 ] Bug #1455526 - CVE-2017-9110 OpenEXR: Out-of-bounds read in the hufDecode function https://bugzilla.redhat.com/show_bug.cgi?id=1455526 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade mingw-OpenEXR' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org |