-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ----------------------------------------------------------------------- Debian LTS Advisory DLA-2885-1 [email protected] https://www.debian.org/lts/security/ Utkarsh Gupta January 17, 2022 https://wiki.debian.org/LTS - -----------------------------------------------------------------------
Package : qtsvg-opensource-src Version : 5.7.1~20161021-2.1+deb9u1 CVE ID : CVE-2021-3481 CVE-2021-45930 Debian Bug : 986798 1002991 Multiple out-of-bounds error were discovered in qtsvg-opensource-src. The highest threat from CVE-2021-3481 (at least) is to data confidentiality the application availability. For Debian 9 stretch, these problems have been fixed in version 5.7.1~20161021-2.1+deb9u1. We recommend that you upgrade your qtsvg-opensource-src packages. For the detailed security status of qtsvg-opensource-src please refer to its security tracker page at: https://security-tracker.debian.org/tracker/qtsvg-opensource-src Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAmHtvrIACgkQgj6WdgbD S5aMSxAAuzCzB3x1aq5pJr0BzAGvK1j4E2/OH5zC3MJ4mi/tm5rAPCBWBv73W6zF b4eEydouEYCSd6tNhUen23ZrwG9a3seTOU4HJwiUGob7ZSpq6vXQ5m8UzF/I0eGh ucmqEYkatescZkS91zRXewHDWuObXxvvhx3HwX6YpqtDbncSSZeLWfqZ+RtWnRDE Skt0q/Sfr2/mA9zHjfdXG75QuwoU5P7K8P1bTUXakGnjs6kpIIpHUBfK4235vwNE hdsPZX421vFTWojEtYeutQGtDTcEJiAwjuPYmHJ8D1bxMbKn8tiHKN07395g0A5R pgucjIbJhhuq4dTBLOp2+3nYAeqLNTuprfRvgOIs0vABkTO7twJb/oQj30lDr5FY lDxupL1lClLajyAQpFCzRIMI1E/qwVqyFm8/Tr5IV9nkKoX8OAyy9xBFj7Kkxm+A IaHTxvg7pe9Fou+ffvR1tDGm8Wyj3Gc308bhHAxKpy69kONcTh5ZKoVraDpo4XwH nf8BRMiFvq47TdR+D+sj8XGpaUm9Q2L54GjYIytsqiZT2mIwo70+nFjt4dGq7rTT Zs7ZnYp7SzdODs2csh9Mfgda8lahCw1MKBVERR0pIpzFMXXsSGRRDVi/RGda5zNe NupMmYleRz/7oywmyVTR6KFqRy4mhGp7EnEHKj9FjedU0LnS/9E= =XRwG -----END PGP SIGNATURE-----
