libpano13: Format string vulnerability A format string vulnerability has been found in libpano13, potentially resulting in arbitrary code execution. libpano13 2021-07-20 2021-07-20 780486 remote 2.9.20 2.9.20

libpano13 is Helmut Dersch’s panorama toolbox library.

A format string issue exists within panoFileOutputNamesCreate() where unvalidated input is passed directly into the formatter.

A remote attacker could entice a user to open a specially crafted file using libpano13, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

There is no known workaround at this time.

All libpano13 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/libpano13-2.9.20"
CVE-2021-20307 ajak ajak