Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package firefox-esr for openSUSE:Factory 
checked in at 2025-05-27 18:43:41
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/firefox-esr (Old)
 and      /work/SRC/openSUSE:Factory/.firefox-esr.new.2732 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "firefox-esr"

Tue May 27 18:43:41 2025 rev:11 rq:1280559 version:128.11.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/firefox-esr/firefox-esr.changes  2025-05-20 
09:40:00.510520550 +0200
+++ /work/SRC/openSUSE:Factory/.firefox-esr.new.2732/firefox-esr.changes        
2025-05-27 18:43:58.557059807 +0200
@@ -1,0 +2,33 @@
+Sun May 25 08:47:26 UTC 2025 - Manfred Hollstein <manfre...@gmx.net>
+
+- Firefox Extended Support Release 128.11.0 ESR
+  * Fixed: Various security fixes.
+- Mozilla Firefox ESR 128.11.0
+  https://www.mozilla.org/security/advisories/mfsa2025-44
+  MFSA 2025-44 (boo#1243353)
+  * CVE-2025-5262 (bmo#1962421)
+    Double-free in libvpx encoder
+  * CVE-2025-5263 (bmo#1960745)
+    Error handling for script execution was incorrectly isolated
+    from web content
+  * CVE-2025-5264 (bmo#1950001)
+    Potential local code execution in “Copy as cURL” command
+  * CVE-2025-5265 (bmo#1962301)
+    Potential local code execution in “Copy as cURL” command
+  * CVE-2025-5266 (bmo#1965628)
+    Script element events leaked cross-origin resource status
+  * CVE-2025-5267 (bmo#1954137)
+    Clickjacking vulnerability could have led to leaking saved
+    payment card details
+  * CVE-2025-5268 (bmo#1950136, bmo#1958121, bmo#1960499,
+    bmo#1962634)
+    Memory safety bugs fixed in Firefox 139, Thunderbird 139,
+    Firefox ESR 128.11, and Thunderbird 128.11
+  * CVE-2025-5269 (bmo#1924108)
+    Memory safety bug fixed in Firefox ESR 128.11 and Thunderbird
+    128.11
+- create-tar.sh: Remove additional slash from candidates URL, which
+  upstream doesn't like, and protect against wiping the keyfile
+  accidentally. Fix typo.
+
+-------------------------------------------------------------------

Old:
----
  firefox-128.10.1esr.source.tar.xz
  firefox-128.10.1esr.source.tar.xz.asc
  l10n-128.10.1esr.tar.xz

New:
----
  firefox-128.11.0esr.source.tar.xz
  firefox-128.11.0esr.source.tar.xz.asc
  l10n-128.11.0esr.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ firefox-esr.spec ++++++
--- /var/tmp/diff_new_pack.kF4C5d/_old  2025-05-27 18:44:03.085250350 +0200
+++ /var/tmp/diff_new_pack.kF4C5d/_new  2025-05-27 18:44:03.085250350 +0200
@@ -41,8 +41,8 @@
 # major 69
 # mainver %%major.99
 %define major          128
-%define mainver        %major.10.1
-%define orig_version   128.10.1
+%define mainver        %major.11.0
+%define orig_version   128.11.0
 %define orig_suffix    esr
 %define update_channel esr
 %define branding       1

++++++ MozillaFirefox.changes.txt ++++++
--- /var/tmp/diff_new_pack.kF4C5d/_old  2025-05-27 18:44:03.201255231 +0200
+++ /var/tmp/diff_new_pack.kF4C5d/_new  2025-05-27 18:44:03.205255399 +0200
@@ -1,4 +1,37 @@
 -------------------------------------------------------------------
+Sun May 25 08:47:26 UTC 2025 - Manfred Hollstein <manfre...@gmx.net>
+
+- Firefox Extended Support Release 128.11.0 ESR
+  * Fixed: Various security fixes.
+- Mozilla Firefox ESR 128.11.0
+  https://www.mozilla.org/security/advisories/mfsa2025-44
+  MFSA 2025-44 (boo#1243353)
+  * CVE-2025-5262 (bmo#1962421)
+    Double-free in libvpx encoder
+  * CVE-2025-5263 (bmo#1960745)
+    Error handling for script execution was incorrectly isolated
+    from web content
+  * CVE-2025-5264 (bmo#1950001)
+    Potential local code execution in “Copy as cURL” command
+  * CVE-2025-5265 (bmo#1962301)
+    Potential local code execution in “Copy as cURL” command
+  * CVE-2025-5266 (bmo#1965628)
+    Script element events leaked cross-origin resource status
+  * CVE-2025-5267 (bmo#1954137)
+    Clickjacking vulnerability could have led to leaking saved
+    payment card details
+  * CVE-2025-5268 (bmo#1950136, bmo#1958121, bmo#1960499,
+    bmo#1962634)
+    Memory safety bugs fixed in Firefox 139, Thunderbird 139,
+    Firefox ESR 128.11, and Thunderbird 128.11
+  * CVE-2025-5269 (bmo#1924108)
+    Memory safety bug fixed in Firefox ESR 128.11 and Thunderbird
+    128.11
+- create-tar.sh: Remove additional slash from candidates URL, which
+  upstream doesn't like, and protect against wiping the keyfile
+  accidentally. Fix typo.
+
+-------------------------------------------------------------------
 Mon May 19 06:09:30 UTC 2025 - Manfred Hollstein <manfre...@gmx.net>
 
 - create-tar.sh: Update keyring-file, if necessary

++++++ create-tar.sh ++++++
--- /var/tmp/diff_new_pack.kF4C5d/_old  2025-05-27 18:44:03.261257756 +0200
+++ /var/tmp/diff_new_pack.kF4C5d/_new  2025-05-27 18:44:03.265257924 +0200
@@ -370,7 +370,7 @@
 
   if ! wget --quiet --show-progress --progress=bar "$FTP_URL/$upstream_file"; 
then
       local CANDIDATE_TARBALL_LOCATION=""
-      PARSED_CANDIDATES_URL="$(printf "%s/%s/" "$(get_ftp_candidates_url 
"$PRODUCT" "$VERSION$VERSION_SUFFIX")" "$BUILD_ID")"
+      PARSED_CANDIDATES_URL="$(printf "%s/%s" "$(get_ftp_candidates_url 
"$PRODUCT" "$VERSION$VERSION_SUFFIX")" "$BUILD_ID")"
       CANDIDATE_TARBALL_LOCATION="$(printf "%s/source/%s" 
"$PARSED_CANDIDATES_URL" "$upstream_file" )"
       wget --quiet --show-progress --progress=bar "$CANDIDATE_TARBALL_LOCATION"
   fi
@@ -580,11 +580,15 @@
 function update_key_file() {
   if [ -e "mozilla.keyring" ]; then
     local UPSTREAM_KEYFILE=""
-    if [ -z "$PARSED_CANDIDATES_URL"]; then
-      local UPSTREAM_KEYFILE=$(curl --silent --fail "$KEY_FTP_URL") || return 
1;
+    if [ -z "$PARSED_CANDIDATES_URL" ]; then
+      local UPSTREAM_KEYFILE=$(curl --silent --fail "$KEY_FTP_URL");
     else
       CANDIDATES_KEY_URL="$(printf "%s/KEY" "$PARSED_CANDIDATES_URL")"
-      local UPSTREAM_KEYFILE=$(curl --silent --fail "$CANDIDATES_KEY_URL") || 
return 1;
+      local UPSTREAM_KEYFILE=$(curl --silent --fail "$CANDIDATES_KEY_URL");
+    fi
+    if [ -z "$UPSTREAM_KEYFILE" ]; then
+      echo "Failed to get upstream keyfile. Skipping."
+      return
     fi
     diff -y --suppress-common-lines -d <(cat mozilla.keyring) <(echo 
"$UPSTREAM_KEYFILE") > /dev/null
     local KEYRING_CHANGED=$?
@@ -593,7 +597,7 @@
       echo "Keyring changed. Updating it."
       echo "$UPSTREAM_KEYFILE" > mozilla.keyring
     else
-      echo "Keyring did not changed."
+      echo "Keyring did not change."
     fi
   else
     echo "No local keyring found. Skipping keyring-check."

++++++ firefox-128.10.1esr.source.tar.xz -> firefox-128.11.0esr.source.tar.xz 
++++++
/work/SRC/openSUSE:Factory/firefox-esr/firefox-128.10.1esr.source.tar.xz 
/work/SRC/openSUSE:Factory/.firefox-esr.new.2732/firefox-128.11.0esr.source.tar.xz
 differ: char 15, line 1

++++++ firefox-esr.changes.txt ++++++
--- /var/tmp/diff_new_pack.kF4C5d/_old  2025-05-27 18:44:03.353261627 +0200
+++ /var/tmp/diff_new_pack.kF4C5d/_new  2025-05-27 18:44:03.357261796 +0200
@@ -1,4 +1,37 @@
 -------------------------------------------------------------------
+Sun May 25 08:47:26 UTC 2025 - Manfred Hollstein <manfre...@gmx.net>
+
+- Firefox Extended Support Release 128.11.0 ESR
+  * Fixed: Various security fixes.
+- Mozilla Firefox ESR 128.11.0
+  https://www.mozilla.org/security/advisories/mfsa2025-44
+  MFSA 2025-44 (boo#1243353)
+  * CVE-2025-5262 (bmo#1962421)
+    Double-free in libvpx encoder
+  * CVE-2025-5263 (bmo#1960745)
+    Error handling for script execution was incorrectly isolated
+    from web content
+  * CVE-2025-5264 (bmo#1950001)
+    Potential local code execution in “Copy as cURL” command
+  * CVE-2025-5265 (bmo#1962301)
+    Potential local code execution in “Copy as cURL” command
+  * CVE-2025-5266 (bmo#1965628)
+    Script element events leaked cross-origin resource status
+  * CVE-2025-5267 (bmo#1954137)
+    Clickjacking vulnerability could have led to leaking saved
+    payment card details
+  * CVE-2025-5268 (bmo#1950136, bmo#1958121, bmo#1960499,
+    bmo#1962634)
+    Memory safety bugs fixed in Firefox 139, Thunderbird 139,
+    Firefox ESR 128.11, and Thunderbird 128.11
+  * CVE-2025-5269 (bmo#1924108)
+    Memory safety bug fixed in Firefox ESR 128.11 and Thunderbird
+    128.11
+- create-tar.sh: Remove additional slash from candidates URL, which
+  upstream doesn't like, and protect against wiping the keyfile
+  accidentally. Fix typo.
+
+-------------------------------------------------------------------
 Mon May 19 06:09:30 UTC 2025 - Manfred Hollstein <manfre...@gmx.net>
 
 - create-tar.sh: Update keyring-file, if necessary

++++++ l10n-128.10.1esr.tar.xz -> l10n-128.11.0esr.tar.xz ++++++

++++++ tar_stamps ++++++
--- /var/tmp/diff_new_pack.kF4C5d/_old  2025-05-27 18:44:03.613272568 +0200
+++ /var/tmp/diff_new_pack.kF4C5d/_new  2025-05-27 18:44:03.617272737 +0200
@@ -1,11 +1,11 @@
 PRODUCT="firefox"
 CHANNEL="esr128"
-VERSION="128.10.1"
+VERSION="128.11.0"
 VERSION_SUFFIX="esr"
-PREV_VERSION="128.10.0"
+PREV_VERSION="128.10.1"
 PREV_VERSION_SUFFIX="esr"
 #SKIP_LOCALES="" # Uncomment to skip l10n and compare-locales-generation
 RELEASE_REPO="https://hg.mozilla.org/releases/mozilla-esr128";
-RELEASE_TAG="cf43f46ebc3d13f3bec9da37ea2c8750b3dfaaf1"
-RELEASE_TIMESTAMP="20250517152055"
+RELEASE_TAG="c6fae8e73635b58fac8a4536e34f63c8518a350d"
+RELEASE_TIMESTAMP="20250519114620"
 

Reply via email to