- thunderbird (1:78.9.0-1~deb10u1+rpi1) buster-staging; urgency=medium
++thunderbird (1:78.10.0-1~deb10u1+rpi1) buster-staging; urgency=medium
+
+ [changes brought over from firefox-esr 60.3.0esr-1+rpi1 by Peter Michael Green <plugwash@raspbian.org> at Wed, 05 Dec 2018 06:56:52 +0000]
+ * Hack broken rust target selection so it produces the right target
+ on raspbian.
+ * Fix clean target.
+
+ [changes introduced in 60.4.0-1+rpi1 by Peter Michael Green]
+ * Further fixes to clean target (still not completely fixed :( ).
+
+ [changes introduced in 1:68.5.0-1~deb10u1+rpi1 by Peter Michael Green]
+ * Disable neon (patches taken from firefox-esr package)
+ * Build in a chroot with arm64 binutils-arm-linux-gnueabihf
+
+ [changes brought forward from 1:68.5.0-1~deb10u1+rpi2 by Peter Michael Green <plugwash@raspbian.org> at Sun, 15 Mar 2020 16:27:21 +0000]
+ * Actually build the binary packages on armhf.
+ * Yet more clean target fixing.
+
+ [changes brought over from firefox-esr 78.3.0esr-2+rpi1 by Peter Michael Green]
+ * Clean up pycache directories.
+ * Disable neon in qcms.
+
+ [changes introduced in 1:78.4.0-1~deb10u1+rpi1 by Peter Michael Green]
+ * Add export NSS_DISABLE_ARM32_NEON=1 to hopefully disable neon in nss.
+ * Adding the define in debian/rules didn't seem to work, try to patch out neon in nss instead
+
- -- Raspbian forward porter <root@raspbian.org> Tue, 30 Mar 2021 14:27:25 +0000
++ -- Raspbian forward porter <root@raspbian.org> Thu, 22 Apr 2021 22:18:54 +0000
++
+ thunderbird (1:78.10.0-1~deb10u1) stable-security; urgency=medium
+
+ * Rebuild for buster-security
+
+ -- Carsten Schoenert <c.schoenert@t-online.de> Tue, 20 Apr 2021 19:33:42 +0200
+
+ thunderbird (1:78.10.0-1) unstable; urgency=medium
+
+ * [f38d78f] New upstream version 78.10.0
+ Fixed CVE issues in upstream version 78.10 (MFSA 2021-15):
+ CVE-2021-23994: Out of bound write due to lazy initialization
+ CVE-2021-23995: Use-after-free in Responsive Design Mode
+ CVE-2021-23998: Secure Lock icon could have been spoofed
+ CVE-2021-23961: More internal network hosts could have been probed by a
+ malicious webpage
+ CVE-2021-23999: Blob URLs may have been granted additional privileges
+ CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an
+ encoded URL
+ CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead
+ to null-reads (This issue only affected x86-32 platforms.)
+ CVE-2021-29946: Port blocking could be bypassed
+ CVE-2021-29948: Race condition when reading from disk while verifying
+ signatures
+
+ -- Carsten Schoenert <c.schoenert@t-online.de> Mon, 19 Apr 2021 20:00:32 +0200
thunderbird (1:78.9.0-1~deb10u1) stable-security; urgency=medium