- thunderbird (1:102.13.0-1~deb11u1+rpi1) bullseye-staging; urgency=medium
++thunderbird (1:102.15.0-1~deb11u1+rpi1) bullseye-staging; urgency=medium
+
+ [changes brought over from firefox-esr 60.3.0esr-1+rpi1 by Peter Michael Green <plugwash@raspbian.org> at Wed, 05 Dec 2018 06:56:52 +0000]
+ * Hack broken rust target selection so it produces the right target
+ on raspbian.
+ * Fix clean target.
+
+ [changes introduced in 60.4.0-1+rpi1 by Peter Michael Green]
+ * Further fixes to clean target (still not completely fixed :( ).
+
+ [changes introduced in 1:68.5.0-1~deb10u1+rpi1 by Peter Michael Green]
+ * Disable neon (patches taken from firefox-esr package)
+ * Build in a chroot with arm64 binutils-arm-linux-gnueabihf
+
+ [changes brought forward from 1:68.5.0-1~deb10u1+rpi2 by Peter Michael Green <plugwash@raspbian.org> at Sun, 15 Mar 2020 16:27:21 +0000]
+ * Actually build the binary packages on armhf.
+ * Yet more clean target fixing.
+
+ [changes brought over from firefox-esr 78.3.0esr-2+rpi1 by Peter Michael Green]
+ * Clean up pycache directories.
+ * Disable neon in qcms.
+
+ [changes introduced in 1:78.4.0-1~deb10u1+rpi1 by Peter Michael Green]
+ * Add export NSS_DISABLE_ARM32_NEON=1 to hopefully disable neon in nss.
+ * Adding the define in debian/rules didn't seem to work, try to patch out neon in nss instead
+
+ [changes brought forward from 1:78.5.1-1+rpi2 by Peter Michael Green <plugwash@raspbian.org> at Tue, 15 Dec 2020 00:33:33 +0000]
+ * Actually build thunderbird binary on armhf
+ (changelog says this was already done, but it got lost somewhere
+ along the way).
+
+ [changes introduced in 1:91.3.2-1+rpi1 by Peter Michael Green]
+ * Use a #define instead of a typedef for double_t in fdlibm to prevent conflicting
+ definitions error.
+
+ [changes introduced in 1:91.5.1-1+rpi1 by Peter Micheal Green]
+ * Further hacks to rust target selection.
+
+ [changes introduced in 1:102.1.1-1+rpi1 by Peter Michael Green]
+ * Don't build rust code with Clto to avoid out of memory errors.
+ * Disable more armv7/neon stuff.
+
+ [changes brought over from firefox-esr 102.2.0esr-1+rpi1 by Peter Michael Green]
+ * Disable jit (or at least try to)
+ + Pass disable-jit from debian/rules
+ + Nerf jit detection in s/moz.configure
+
- -- Raspbian forward porter <root@raspbian.org> Fri, 28 Jul 2023 16:57:17 +0000
++ -- Raspbian forward porter <root@raspbian.org> Sat, 16 Sep 2023 06:37:47 +0000
++
+ thunderbird (1:102.15.0-1~deb11u1) bullseye-security; urgency=medium
+
+ * Rebuild for bullseye-security
+
+ -- Christoph Goehre <chris@sigxcpu.org> Fri, 01 Sep 2023 18:52:34 +0200
+
+ thunderbird (1:102.15.0-1~deb12u1) bookworm-security; urgency=medium
+
+ * [6c701df] New upstream version 102.15.0
+ Fixed CVE issues in upstream version 102.15 (MFSA 2023-35):
+ CVE-2023-4573: Memory corruption in IPC CanvasTranslator
+ CVE-2023-4574: Memory corruption in IPC ColorPickerShownCallback
+ CVE-2023-4575: Memory corruption in IPC FilePickerShownCallback
+ CVE-2023-4576: Integer Overflow in RecordedSourceSurfaceCreation
+ CVE-2023-4581: XLL file extensions were downloadable without warnings
+ CVE-2023-4584: Memory safety bugs fixed in Firefox 117, Firefox ESR
+ 102.15, Firefox ESR 115.2, Thunderbird 102.15, and
+ Thunderbird 115.2
+
+ -- Christoph Goehre <chris@sigxcpu.org> Thu, 31 Aug 2023 17:15:52 +0200
+
+ thunderbird (1:102.14.0-1~deb11u1) bullseye-security; urgency=medium
+
+ * Rebuild for bullseye-security
+
+ -- Carsten Schoenert <c.schoenert@t-online.de> Sat, 05 Aug 2023 07:43:40 +0200
+
+ thunderbird (1:102.14.0-1~deb12u1) bookworm-security; urgency=medium
+
+ * [bcc7c87] New upstream version 102.14.0
+ Fixed CVE issues in upstream version 102.14 (MFSA 2023-32):
+ CVE-2023-4045: Offscreen Canvas could have bypassed cross-origin restrictions
+ CVE-2023-4046: Incorrect value used during WASM compilation
+ CVE-2023-4047: Potential permissions request bypass via clickjacking
+ CVE-2023-4048: Crash in DOMParser due to out-of-memory conditions
+ CVE-2023-4049: Fix potential race conditions when releasing platform objects
+ CVE-2023-4050: Stack buffer overflow in StorageManager
+ CVE-2023-4055: Cookie jar overflow caused unexpected cookie jar state
+ CVE-2023-4056: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1,
+ Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14
+ * Rebuild for bookworm-security
+
+ -- Carsten Schoenert <c.schoenert@t-online.de> Fri, 04 Aug 2023 19:48:57 +0200
+
+ thunderbird (1:102.13.1-1~deb11u1) bullseye-security; urgency=medium
+
+ * Rebuild for bullseye-security
+
+ -- Carsten Schoenert <c.schoenert@t-online.de> Fri, 28 Jul 2023 19:11:39 +0200
+
+ thunderbird (1:102.13.1-1~deb12u1) bookworm-security; urgency=medium
+
+ * Rebuild for bookworm-security
+
+ -- Carsten Schoenert <c.schoenert@t-online.de> Fri, 28 Jul 2023 16:02:28 +0200
+
+ thunderbird (1:102.13.1-1) unstable; urgency=medium
+
+ * [e803b54] New upstream version 102.13.1
+ Fixed CVE issues in upstream version 102.13.1 (MFSA 2023-28):
+ CVE-2023-3417: File Extension Spoofing using the Text Direction
+ Override Character
+ * [456ce20] Rebuild patch queue from patch-queue branch
+ Added patch:
+ fixes/gfx-Fix-inclusion-of-C-header.patch
+ fixes/toolkit-Fix-inclusion-of-C-header.patch
+ (Closes: #1037872)
+
+ -- Carsten Schoenert <c.schoenert@t-online.de> Wed, 26 Jul 2023 19:48:59 +0200
thunderbird (1:102.13.0-1~deb11u1) bullseye-security; urgency=medium