-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5497-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff September 13, 2023 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libwebp CVE ID : CVE-2023-4863 A buffer overflow in parsing WebP images may result in the execution of arbitrary code. For the stable distribution (bookworm), this problem has been fixed in version 1.2.4-0.2+deb12u1. We recommend that you upgrade your libwebp packages. For the detailed security status of libwebp please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libwebp Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmUCI48ACgkQEMKTtsN8 TjZ6xA/+O7pTgHPsA9EqPp7kZAROOB/a7YyjqI3u3Krun6YMhf/QApCxFWWnXOu7 3MPDOTarFj2AUjhn6IOEIbGbHEfcr4On0BabOGnXbVpdrhwa1WN3OPxj5XChel4b XXu6H07l2mRh6K4O/m7kt630VDYu4j2eC3ZOQXhQ/+arqYAkMJN0uy9yXwSdpxnu Jei0FcsTKRDb4g9qye/sHjivB7wMRic9ZLxcSRET2zd/ruUBqk0Z4S9d58qq/Xza yYguOuqthelfPA8Yr7AzT/ZIrrbejDQr3h8WAfiC3a/Gx7j1y1Ll5JoOib1/AoB/ fpzyboc27BjCnW0BVbCyHXmdyUK739pnqOa8XrtsBqUkEO53JesTmEVEAUlH/YVp /SR3Y7NrrSWYd52LTAkmRIpD+Qnd3cGkc7WIaPwO4nIRLj1YOaOsD5F0N8LxklO1 dEoBzuGPoXlkf8FcI+64lhv9LJDcY3QkKxxiqV78B6jibW5rzLi1FFa6Alo8KE+/ Wyz20XDXqN04Ni1QNc8TEE2z0Xcp1CoXjQPg0El5zQXNqmBdmBdFPjqGU6ipAnxa cZAFXiYr3aGBmgVvSHtE+nPczijtFNB7f2BIS9V11EqRc+lEhzc1LrXgt+QOYW3p uZaEtJKU8c7QR+khmY/HM9n5mfNulamvgNicqSKjXE07KhIBI/U= =5C/b -----END PGP SIGNATURE-----