- thunderbird (1:68.7.0-1+rpi1) bullseye-staging; urgency=medium
++thunderbird (1:68.8.0-1+rpi1) bullseye-staging; urgency=medium
+
+ [changes brought over from firefox-esr 60.3.0esr-1+rpi1 by Peter Michael Green <plugwash@raspbian.org> at Wed, 05 Dec 2018 06:56:52 +0000]
+ * Hack broken rust target selection so it produces the right target
+ on raspbian.
+ * Fix clean target.
+
+ [changes introduced in 60.4.0-1+rpi1 by Peter Michael Green]
+ * Further fixes to clean target (still not completely fixed :( ).
+
+ [changes introduced in 1:68.5.0-1~deb10u1+rpi1 by Peter Michael Green]
+ * Disable neon (patches taken from firefox-esr package)
+ * Build in a chroot with arm64 binutils-arm-linux-gnueabihf
+
+ [changes brought forward from 1:68.5.0-1~deb10u1+rpi2 by Peter Michael Green <plugwash@raspbian.org> at Sun, 15 Mar 2020 16:27:21 +0000]
+ * Actually build the binary packages on armhf.
+ * Yet more clean target fixing.
+
- -- Raspbian forward porter <root@raspbian.org> Wed, 29 Apr 2020 04:14:45 +0000
++ -- Raspbian forward porter <root@raspbian.org> Mon, 11 May 2020 16:10:35 +0000
++
+ thunderbird (1:68.8.0-1) unstable; urgency=medium
+
+ * [9b5ae46] New upstream version 68.8.0
+ Fixed CVE issues in upstream version 68.8.0 (MFSA 2020-18):
+ CVE-2020-12397: Sender Email Address Spoofing using encoded Unicode
+ characters
+ CVE-2020-12387: Use-after-free during worker shutdown
+ CVE-2020-6831: Buffer overflow in SCTP chunk input validation
+ CVE-2020-12392: Arbitrary local file access with 'Copy as cURL'
+ CVE-2020-12393: Devtools' 'Copy as cURL' feature did not fully escape
+ website-controlled data, potentially leading to command
+ injection
+ CVE-2020-12395: Memory safety bugs fixed in Thunderbird 68.8.0
+
+ -- Carsten Schoenert <c.schoenert@t-online.de> Tue, 05 May 2020 20:47:29 +0200
thunderbird (1:68.7.0-1) unstable; urgency=medium