A buffer overflow in parsing WebP images may result in the execution of arbitrary code. For the oldstable distribution (bullseye), this problem has been fixed in version 1:102.15.1-1~deb11u1. For the stable distribution (bookworm), this problem has been fixed in version 1:102.15.1-1~deb12u1. We recommend that you upgrade your thunderbird packages. For the detailed security status of thunderbird please refer to its security tracker page at: https://security-tracker.debian.org/tracker/thunderbird
A buffer overflow in parsing WebP images may result in the execution of arbitrary code.
For the oldstable distribution (bullseye), this problem has been fixed in version 1:102.15.1-1~deb11u1.
For the stable distribution (bookworm), this problem has been fixed in version 1:102.15.1-1~deb12u1.
We recommend that you upgrade your thunderbird packages.
For the detailed security status of thunderbird please refer to its security tracker page at: https://security-tracker.debian.org/tracker/thunderbird