-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5497-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
September 13, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libwebp
CVE ID : CVE-2023-4863
A buffer overflow in parsing WebP images may result in the execution of
arbitrary code.
For the stable distribution (bookworm), this problem has been fixed in
version 1.2.4-0.2+deb12u1.
We recommend that you upgrade your libwebp packages.
For the detailed security status of libwebp please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libwebp
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmUCI48ACgkQEMKTtsN8
TjZ6xA/+O7pTgHPsA9EqPp7kZAROOB/a7YyjqI3u3Krun6YMhf/QApCxFWWnXOu7
3MPDOTarFj2AUjhn6IOEIbGbHEfcr4On0BabOGnXbVpdrhwa1WN3OPxj5XChel4b
XXu6H07l2mRh6K4O/m7kt630VDYu4j2eC3ZOQXhQ/+arqYAkMJN0uy9yXwSdpxnu
Jei0FcsTKRDb4g9qye/sHjivB7wMRic9ZLxcSRET2zd/ruUBqk0Z4S9d58qq/Xza
yYguOuqthelfPA8Yr7AzT/ZIrrbejDQr3h8WAfiC3a/Gx7j1y1Ll5JoOib1/AoB/
fpzyboc27BjCnW0BVbCyHXmdyUK739pnqOa8XrtsBqUkEO53JesTmEVEAUlH/YVp
/SR3Y7NrrSWYd52LTAkmRIpD+Qnd3cGkc7WIaPwO4nIRLj1YOaOsD5F0N8LxklO1
dEoBzuGPoXlkf8FcI+64lhv9LJDcY3QkKxxiqV78B6jibW5rzLi1FFa6Alo8KE+/
Wyz20XDXqN04Ni1QNc8TEE2z0Xcp1CoXjQPg0El5zQXNqmBdmBdFPjqGU6ipAnxa
cZAFXiYr3aGBmgVvSHtE+nPczijtFNB7f2BIS9V11EqRc+lEhzc1LrXgt+QOYW3p
uZaEtJKU8c7QR+khmY/HM9n5mfNulamvgNicqSKjXE07KhIBI/U=
=5C/b
-----END PGP SIGNATURE-----