-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ----------------------------------------------------------------------- Debian LTS Advisory DLA-2624-1 [email protected] https://www.debian.org/lts/security/ Utkarsh Gupta April 12, 2021 https://wiki.debian.org/LTS - -----------------------------------------------------------------------
Package : libpano13 Version : 2.9.19+dfsg-2+deb9u1 CVE ID : CVE-2021-20307 Debian Bug : 985249 Format string vulnerability in panoFileOutputNamesCreate() in libpano13 2.9.20~rc2+dfsg-3 and earlier can lead to read and write arbitrary memory values. For Debian 9 stretch, this problem has been fixed in version 2.9.19+dfsg-2+deb9u1. We recommend that you upgrade your libpano13 packages. For the detailed security status of libpano13 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libpano13 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAmB0lL4ACgkQgj6WdgbD S5YsKhAAwMziPKWHxTcjJUcKWLFNPZYofY26NLsjXA09YfNn8O5CpyvCnmePGlNb 7Ffgzhw1QxqiEQ7ikc+bAXGsUiG4XYfVH/aa9lCPP0mrY3Ty8VPI3bloBZdczkRG HlUnGHlol7GkoMdG/XwvkENq+eM2Gn6897v5jPEhpq071fBs2T/zP2QcfveVrqb8 DMShSHzQLV/yVl2rRP8C3j+ANGE1gjuA5XJIix52KXJNMy82lQS2+6ncmvbAJ3WD eD6Q4weHejcGuxcbw4fMdTHxerNS4U2f4Zcprvqvi0DSGpK1OvW/4uHPVCcGKIIz I8WWxsXRdaSILmr2ryx8T+Zp4g9e4GIBqY4n9VNw3J/A2RJvc7KlMT6WtYT/qaTY G9yxbP+qGBgJw5v++rP38w/mOnKjKhYiIOrZvoXlUTUrmGTku79JBnVmtBY5Phdk +Z47Mk7FQOCtnUDkWx+xR1ceWsS3mumEyZ3CGrx9hUDF1C2USJXMeVbnyMXYStuv g+fTQOflk58rt8dtD8B9Fcte/Fe/ih9cGHvLOi1s1miidzDMpzxCHOjev8kDDflu Zcjy8xgjzUjpt2OZLZLFctkxsFhQeMCxy6EndIasUWKf11qiiXfSVf/I6mStD11g wDjJ4wHKsiia6o4iN7i0eiE1JQ7JheAs1N1DMUvM4/LO69+ulf8= =CcAn -----END PGP SIGNATURE-----
