- -----------------------------------------------------------------------
Debian LTS Advisory DLA-2624-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Utkarsh Gupta
April 12, 2021                              https://wiki.debian.org/LTS
- -----------------------------------------------------------------------

Package        : libpano13
Version        : 2.9.19+dfsg-2+deb9u1
CVE ID         : CVE-2021-20307
Debian Bug     : 985249

Format string vulnerability in panoFileOutputNamesCreate() in
libpano13 2.9.20~rc2+dfsg-3 and earlier can lead to read and
write arbitrary memory values.

For Debian 9 stretch, this problem has been fixed in version
2.9.19+dfsg-2+deb9u1.

We recommend that you upgrade your libpano13 packages.

For the detailed security status of libpano13 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/libpano13

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-2624-1: libpano13 security update

April 12, 2021
Format string vulnerability in panoFileOutputNamesCreate() in libpano13 2.9.20~rc2+dfsg-3 and earlier can lead to read and write arbitrary memory values

Summary

For Debian 9 stretch, this problem has been fixed in version
2.9.19+dfsg-2+deb9u1.

We recommend that you upgrade your libpano13 packages.

For the detailed security status of libpano13 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/libpano13

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : libpano13
Version : 2.9.19+dfsg-2+deb9u1
CVE ID : CVE-2021-20307
Debian Bug : 985249

Related News