From: Raspbian automatic forward porter Date: Mon, 11 May 2020 16:10:38 +0000 (+0100) Subject: Merge version 1:68.7.0-1+rpi1 and 1:68.8.0-1 to produce 1:68.8.0-1+rpi1 X-Git-Tag: archive/raspbian/1%68.8.0-1+rpi1^0 X-Git-Url: https://dgit.raspbian.org/?a=commitdiff_plain;h=7ff53225120c2026efdde04528da43155ad9bdd7;p=thunderbird.git Merge version 1:68.7.0-1+rpi1 and 1:68.8.0-1 to produce 1:68.8.0-1+rpi1 --- 7ff53225120c2026efdde04528da43155ad9bdd7 diff --cc debian/changelog index fcc52cadb8,069638a2f8..26a08e9576 --- a/debian/changelog +++ b/debian/changelog @@@ -1,22 -1,18 +1,38 @@@ - thunderbird (1:68.7.0-1+rpi1) bullseye-staging; urgency=medium ++thunderbird (1:68.8.0-1+rpi1) bullseye-staging; urgency=medium + + [changes brought over from firefox-esr 60.3.0esr-1+rpi1 by Peter Michael Green at Wed, 05 Dec 2018 06:56:52 +0000] + * Hack broken rust target selection so it produces the right target + on raspbian. + * Fix clean target. + + [changes introduced in 60.4.0-1+rpi1 by Peter Michael Green] + * Further fixes to clean target (still not completely fixed :( ). + + [changes introduced in 1:68.5.0-1~deb10u1+rpi1 by Peter Michael Green] + * Disable neon (patches taken from firefox-esr package) + * Build in a chroot with arm64 binutils-arm-linux-gnueabihf + + [changes brought forward from 1:68.5.0-1~deb10u1+rpi2 by Peter Michael Green at Sun, 15 Mar 2020 16:27:21 +0000] + * Actually build the binary packages on armhf. + * Yet more clean target fixing. + - -- Raspbian forward porter Wed, 29 Apr 2020 04:14:45 +0000 ++ -- Raspbian forward porter Mon, 11 May 2020 16:10:35 +0000 ++ + thunderbird (1:68.8.0-1) unstable; urgency=medium + + * [9b5ae46] New upstream version 68.8.0 + Fixed CVE issues in upstream version 68.8.0 (MFSA 2020-18): + CVE-2020-12397: Sender Email Address Spoofing using encoded Unicode + characters + CVE-2020-12387: Use-after-free during worker shutdown + CVE-2020-6831: Buffer overflow in SCTP chunk input validation + CVE-2020-12392: Arbitrary local file access with 'Copy as cURL' + CVE-2020-12393: Devtools' 'Copy as cURL' feature did not fully escape + website-controlled data, potentially leading to command + injection + CVE-2020-12395: Memory safety bugs fixed in Thunderbird 68.8.0 + + -- Carsten Schoenert Tue, 05 May 2020 20:47:29 +0200 thunderbird (1:68.7.0-1) unstable; urgency=medium