Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package firefox-esr for openSUSE:Factory checked in at 2026-05-19 17:51:15 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/firefox-esr (Old) and /work/SRC/openSUSE:Factory/.firefox-esr.new.1966 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "firefox-esr" Tue May 19 17:51:15 2026 rev:36 rq:1354028 version:140.11.0 Changes: -------- --- /work/SRC/openSUSE:Factory/firefox-esr/MozillaFirefox.changes 2026-05-08 16:44:36.831283689 +0200 +++ /work/SRC/openSUSE:Factory/.firefox-esr.new.1966/MozillaFirefox.changes 2026-05-19 17:51:55.092476296 +0200 @@ -1,0 +2,74 @@ +Tue May 19 12:41:51 UTC 2026 - Manfred Hollstein <[email protected]> + +- Firefox Extended Support Release 140.11.0 ESR + * Fixed: Various security fixes. +- Mozilla Firefox ESR 140.11.0 + https://www.mozilla.org/security/advisories/mfsa2026-48 + MFSA 2026-48 (boo#1265212) + * CVE-2026-8946 (bmo#2029070) + Incorrect boundary conditions in the Audio/Video: Web Codecs + component + * CVE-2026-8388 (bmo#2036978) + Incorrect boundary conditions in the JavaScript Engine: JIT + component + * CVE-2026-8947 (bmo#2038439) + Use-after-free in the DOM: Bindings (WebIDL) component + * CVE-2026-8391 (bmo#2038575) + Other issue in the JavaScript Engine component + * CVE-2026-8401 (bmo#2038679) + Sandbox escape in the Profile Backup component + * CVE-2026-8949 (bmo#1355639) + Integer overflow in the Widget: Win32 component + * CVE-2026-8950 (bmo#1965430) + Same-origin policy bypass in the Networking: HTTP component + * CVE-2026-8953 (bmo#2029511) + Sandbox escape due to use-after-free in the Disability Access + APIs component + * CVE-2026-8954 (bmo#2030747) + Incorrect boundary conditions, integer overflow in the + Audio/Video component + * CVE-2026-8955 (bmo#2031064) + Privilege escalation in the DOM: Workers component + * CVE-2026-8956 (bmo#2032427) + Integer overflow in the Networking: JAR component + * CVE-2026-8957 (bmo#2033850) + Privilege escalation in the Enterprise Policies component + * CVE-2026-8958 (bmo#2034713) + Information disclosure, sandbox escape in the Security: + Process Sandboxing component + * CVE-2026-8959 (bmo#2034754) + Sandbox escape due to incorrect boundary conditions in the + Widget: Win32 component + * CVE-2026-8961 (bmo#1962625) + Spoofing issue in the Form Autofill component + * CVE-2026-8962 (bmo#2004804) + Mitigation bypass in the DOM: Security component + * CVE-2026-8968 (bmo#2030467) + Denial-of-service due to invalid pointer in the Audio/Video: + Web Codecs component + * CVE-2026-8970 (bmo#2032174) + Privilege escalation in the Security component + * CVE-2026-8974 (bmo#1784128, bmo#1883230, bmo#1983677, + bmo#2022390, bmo#2023116, bmo#2023657, bmo#2024255, + bmo#2024418, bmo#2024441, bmo#2024447, bmo#2024966, + bmo#2025412, bmo#2025467, bmo#2025940, bmo#2025950, + bmo#2025956, bmo#2026284, bmo#2027247, bmo#2027255, + bmo#2027288, bmo#2027306, bmo#2027322, bmo#2027332, + bmo#2027333, bmo#2028266, bmo#2028292, bmo#2028319, + bmo#2028526, bmo#2028870, bmo#2028876, bmo#2028882, + bmo#2029062, bmo#2029309, bmo#2029414, bmo#2029422, + bmo#2029428, bmo#2029447, bmo#2029732, bmo#2029785, + bmo#2029793, bmo#2029813, bmo#2029899, bmo#2031028, + bmo#2031457, bmo#2032039, bmo#2033610, bmo#2033854, + bmo#2034498, bmo#2034628, bmo#2034978, bmo#2035966, + bmo#2036668, bmo#2036905, bmo#2036930) + Memory safety bugs fixed in Firefox ESR 140.11 and Firefox + 151 + * CVE-2026-8975 (bmo#1860195, bmo#2029325, bmo#2029429, + bmo#2029910, bmo#2035915, bmo#2038669, bmo#2038678) + Memory safety bugs fixed in Firefox ESR 115.36, Firefox ESR + 140.11 and Firefox 151 +- Refresh mozilla-silence-no-return-type.patch +- Remove now obsolete mozilla-bmo2031958.patch + +------------------------------------------------------------------- firefox-esr.changes: same change Old: ---- firefox-140.10.2esr.source.tar.xz firefox-140.10.2esr.source.tar.xz.asc l10n-140.10.2esr.tar.xz mozilla-bmo2031958.patch New: ---- firefox-140.11.0esr.source.tar.xz firefox-140.11.0esr.source.tar.xz.asc l10n-140.11.0esr.tar.xz ----------(Old B)---------- Old:/work/SRC/openSUSE:Factory/.firefox-esr.new.1966/MozillaFirefox.changes-- Refresh mozilla-silence-no-return-type.patch /work/SRC/openSUSE:Factory/.firefox-esr.new.1966/MozillaFirefox.changes:- Remove now obsolete mozilla-bmo2031958.patch /work/SRC/openSUSE:Factory/.firefox-esr.new.1966/MozillaFirefox.changes- -- /work/SRC/openSUSE:Factory/.firefox-esr.new.1966/firefox-esr.changes-- Refresh mozilla-silence-no-return-type.patch /work/SRC/openSUSE:Factory/.firefox-esr.new.1966/firefox-esr.changes:- Remove now obsolete mozilla-bmo2031958.patch /work/SRC/openSUSE:Factory/.firefox-esr.new.1966/firefox-esr.changes- ----------(Old E)---------- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ firefox-esr.spec ++++++ --- /var/tmp/diff_new_pack.DrXMzu/_old 2026-05-19 17:52:07.748999922 +0200 +++ /var/tmp/diff_new_pack.DrXMzu/_new 2026-05-19 17:52:07.748999922 +0200 @@ -41,8 +41,8 @@ # major 69 # mainver %%major.99 %define major 140 -%define mainver %major.10.2 -%define orig_version 140.10.2 +%define mainver %major.11.0 +%define orig_version 140.11.0 %define orig_suffix esr %define update_channel esr %define branding 1 @@ -249,7 +249,6 @@ Patch20: one_swizzle_to_rule_them_all.patch Patch21: svg-rendering.patch Patch24: mozilla-bmo1746799.patch -Patch25: mozilla-bmo2031958.patch Patch26: mozilla-bmo1999625.patch Patch27: mozilla-bmo2016618.patch # Firefox/browser ++++++ MozillaFirefox.changes.txt ++++++ --- /var/tmp/diff_new_pack.DrXMzu/_old 2026-05-19 17:52:07.969009024 +0200 +++ /var/tmp/diff_new_pack.DrXMzu/_new 2026-05-19 17:52:07.977009355 +0200 @@ -1,4 +1,78 @@ ------------------------------------------------------------------- +Tue May 19 12:41:51 UTC 2026 - Manfred Hollstein <[email protected]> + +- Firefox Extended Support Release 140.11.0 ESR + * Fixed: Various security fixes. +- Mozilla Firefox ESR 140.11.0 + https://www.mozilla.org/security/advisories/mfsa2026-48 + MFSA 2026-48 (boo#1265212) + * CVE-2026-8946 (bmo#2029070) + Incorrect boundary conditions in the Audio/Video: Web Codecs + component + * CVE-2026-8388 (bmo#2036978) + Incorrect boundary conditions in the JavaScript Engine: JIT + component + * CVE-2026-8947 (bmo#2038439) + Use-after-free in the DOM: Bindings (WebIDL) component + * CVE-2026-8391 (bmo#2038575) + Other issue in the JavaScript Engine component + * CVE-2026-8401 (bmo#2038679) + Sandbox escape in the Profile Backup component + * CVE-2026-8949 (bmo#1355639) + Integer overflow in the Widget: Win32 component + * CVE-2026-8950 (bmo#1965430) + Same-origin policy bypass in the Networking: HTTP component + * CVE-2026-8953 (bmo#2029511) + Sandbox escape due to use-after-free in the Disability Access + APIs component + * CVE-2026-8954 (bmo#2030747) + Incorrect boundary conditions, integer overflow in the + Audio/Video component + * CVE-2026-8955 (bmo#2031064) + Privilege escalation in the DOM: Workers component + * CVE-2026-8956 (bmo#2032427) + Integer overflow in the Networking: JAR component + * CVE-2026-8957 (bmo#2033850) + Privilege escalation in the Enterprise Policies component + * CVE-2026-8958 (bmo#2034713) + Information disclosure, sandbox escape in the Security: + Process Sandboxing component + * CVE-2026-8959 (bmo#2034754) + Sandbox escape due to incorrect boundary conditions in the + Widget: Win32 component + * CVE-2026-8961 (bmo#1962625) + Spoofing issue in the Form Autofill component + * CVE-2026-8962 (bmo#2004804) + Mitigation bypass in the DOM: Security component + * CVE-2026-8968 (bmo#2030467) + Denial-of-service due to invalid pointer in the Audio/Video: + Web Codecs component + * CVE-2026-8970 (bmo#2032174) + Privilege escalation in the Security component + * CVE-2026-8974 (bmo#1784128, bmo#1883230, bmo#1983677, + bmo#2022390, bmo#2023116, bmo#2023657, bmo#2024255, + bmo#2024418, bmo#2024441, bmo#2024447, bmo#2024966, + bmo#2025412, bmo#2025467, bmo#2025940, bmo#2025950, + bmo#2025956, bmo#2026284, bmo#2027247, bmo#2027255, + bmo#2027288, bmo#2027306, bmo#2027322, bmo#2027332, + bmo#2027333, bmo#2028266, bmo#2028292, bmo#2028319, + bmo#2028526, bmo#2028870, bmo#2028876, bmo#2028882, + bmo#2029062, bmo#2029309, bmo#2029414, bmo#2029422, + bmo#2029428, bmo#2029447, bmo#2029732, bmo#2029785, + bmo#2029793, bmo#2029813, bmo#2029899, bmo#2031028, + bmo#2031457, bmo#2032039, bmo#2033610, bmo#2033854, + bmo#2034498, bmo#2034628, bmo#2034978, bmo#2035966, + bmo#2036668, bmo#2036905, bmo#2036930) + Memory safety bugs fixed in Firefox ESR 140.11 and Firefox + 151 + * CVE-2026-8975 (bmo#1860195, bmo#2029325, bmo#2029429, + bmo#2029910, bmo#2035915, bmo#2038669, bmo#2038678) + Memory safety bugs fixed in Firefox ESR 115.36, Firefox ESR + 140.11 and Firefox 151 +- Refresh mozilla-silence-no-return-type.patch +- Remove now obsolete mozilla-bmo2031958.patch + +------------------------------------------------------------------- Thu May 7 14:24:15 UTC 2026 - Manfred Hollstein <[email protected]> - Firefox Extended Support Release 140.10.2 ESR ++++++ firefox-140.10.2esr.source.tar.xz -> firefox-140.11.0esr.source.tar.xz ++++++ /work/SRC/openSUSE:Factory/firefox-esr/firefox-140.10.2esr.source.tar.xz /work/SRC/openSUSE:Factory/.firefox-esr.new.1966/firefox-140.11.0esr.source.tar.xz differ: char 15, line 1 ++++++ firefox-esr.changes.txt ++++++ --- /var/tmp/diff_new_pack.DrXMzu/_old 2026-05-19 17:52:08.209018954 +0200 +++ /var/tmp/diff_new_pack.DrXMzu/_new 2026-05-19 17:52:08.217019285 +0200 @@ -1,4 +1,78 @@ ------------------------------------------------------------------- +Tue May 19 12:41:51 UTC 2026 - Manfred Hollstein <[email protected]> + +- Firefox Extended Support Release 140.11.0 ESR + * Fixed: Various security fixes. +- Mozilla Firefox ESR 140.11.0 + https://www.mozilla.org/security/advisories/mfsa2026-48 + MFSA 2026-48 (boo#1265212) + * CVE-2026-8946 (bmo#2029070) + Incorrect boundary conditions in the Audio/Video: Web Codecs + component + * CVE-2026-8388 (bmo#2036978) + Incorrect boundary conditions in the JavaScript Engine: JIT + component + * CVE-2026-8947 (bmo#2038439) + Use-after-free in the DOM: Bindings (WebIDL) component + * CVE-2026-8391 (bmo#2038575) + Other issue in the JavaScript Engine component + * CVE-2026-8401 (bmo#2038679) + Sandbox escape in the Profile Backup component + * CVE-2026-8949 (bmo#1355639) + Integer overflow in the Widget: Win32 component + * CVE-2026-8950 (bmo#1965430) + Same-origin policy bypass in the Networking: HTTP component + * CVE-2026-8953 (bmo#2029511) + Sandbox escape due to use-after-free in the Disability Access + APIs component + * CVE-2026-8954 (bmo#2030747) + Incorrect boundary conditions, integer overflow in the + Audio/Video component + * CVE-2026-8955 (bmo#2031064) + Privilege escalation in the DOM: Workers component + * CVE-2026-8956 (bmo#2032427) + Integer overflow in the Networking: JAR component + * CVE-2026-8957 (bmo#2033850) + Privilege escalation in the Enterprise Policies component + * CVE-2026-8958 (bmo#2034713) + Information disclosure, sandbox escape in the Security: + Process Sandboxing component + * CVE-2026-8959 (bmo#2034754) + Sandbox escape due to incorrect boundary conditions in the + Widget: Win32 component + * CVE-2026-8961 (bmo#1962625) + Spoofing issue in the Form Autofill component + * CVE-2026-8962 (bmo#2004804) + Mitigation bypass in the DOM: Security component + * CVE-2026-8968 (bmo#2030467) + Denial-of-service due to invalid pointer in the Audio/Video: + Web Codecs component + * CVE-2026-8970 (bmo#2032174) + Privilege escalation in the Security component + * CVE-2026-8974 (bmo#1784128, bmo#1883230, bmo#1983677, + bmo#2022390, bmo#2023116, bmo#2023657, bmo#2024255, + bmo#2024418, bmo#2024441, bmo#2024447, bmo#2024966, + bmo#2025412, bmo#2025467, bmo#2025940, bmo#2025950, + bmo#2025956, bmo#2026284, bmo#2027247, bmo#2027255, + bmo#2027288, bmo#2027306, bmo#2027322, bmo#2027332, + bmo#2027333, bmo#2028266, bmo#2028292, bmo#2028319, + bmo#2028526, bmo#2028870, bmo#2028876, bmo#2028882, + bmo#2029062, bmo#2029309, bmo#2029414, bmo#2029422, + bmo#2029428, bmo#2029447, bmo#2029732, bmo#2029785, + bmo#2029793, bmo#2029813, bmo#2029899, bmo#2031028, + bmo#2031457, bmo#2032039, bmo#2033610, bmo#2033854, + bmo#2034498, bmo#2034628, bmo#2034978, bmo#2035966, + bmo#2036668, bmo#2036905, bmo#2036930) + Memory safety bugs fixed in Firefox ESR 140.11 and Firefox + 151 + * CVE-2026-8975 (bmo#1860195, bmo#2029325, bmo#2029429, + bmo#2029910, bmo#2035915, bmo#2038669, bmo#2038678) + Memory safety bugs fixed in Firefox ESR 115.36, Firefox ESR + 140.11 and Firefox 151 +- Refresh mozilla-silence-no-return-type.patch +- Remove now obsolete mozilla-bmo2031958.patch + +------------------------------------------------------------------- Thu May 7 14:24:15 UTC 2026 - Manfred Hollstein <[email protected]> - Firefox Extended Support Release 140.10.2 ESR ++++++ l10n-140.10.2esr.tar.xz -> l10n-140.11.0esr.tar.xz ++++++ ++++++ mozilla-silence-no-return-type.patch ++++++ --- /var/tmp/diff_new_pack.DrXMzu/_old 2026-05-19 17:52:08.657037489 +0200 +++ /var/tmp/diff_new_pack.DrXMzu/_new 2026-05-19 17:52:08.661037654 +0200 @@ -747,7 +747,7 @@ diff --git a/third_party/libwebrtc/modules/desktop_capture/linux/wayland/screencast_portal.cc b/third_party/libwebrtc/modules/desktop_capture/linux/wayland/screencast_portal.cc --- a/third_party/libwebrtc/modules/desktop_capture/linux/wayland/screencast_portal.cc +++ b/third_party/libwebrtc/modules/desktop_capture/linux/wayland/screencast_portal.cc -@@ -39,16 +39,17 @@ ScreenCastPortal::CaptureSourceType Scre +@@ -41,16 +41,17 @@ ScreenCastPortal::CaptureSourceType Scre switch (type) { case CaptureType::kScreen: return ScreenCastPortal::CaptureSourceType::kScreen; @@ -763,8 +763,8 @@ : ScreenCastPortal(type, notifier, OnProxyRequested, - OnSourcesRequestResponseSignal, - this) {} + OnSourcesRequestResponseSignal) {} + diff --git a/third_party/libwebrtc/modules/pacing/bitrate_prober.cc b/third_party/libwebrtc/modules/pacing/bitrate_prober.cc --- a/third_party/libwebrtc/modules/pacing/bitrate_prober.cc +++ b/third_party/libwebrtc/modules/pacing/bitrate_prober.cc ++++++ tar_stamps ++++++ --- /var/tmp/diff_new_pack.DrXMzu/_old 2026-05-19 17:52:08.777042454 +0200 +++ /var/tmp/diff_new_pack.DrXMzu/_new 2026-05-19 17:52:08.793043116 +0200 @@ -1,11 +1,11 @@ PRODUCT="firefox" CHANNEL="esr140" -VERSION="140.10.2" +VERSION="140.11.0" VERSION_SUFFIX="esr" -PREV_VERSION="140.10.1" +PREV_VERSION="140.10.2" PREV_VERSION_SUFFIX="esr" #SKIP_LOCALES="" # Uncomment to skip l10n and compare-locales-generation RELEASE_REPO="https://hg.mozilla.org/releases/mozilla-esr140" -RELEASE_TAG="6220f392be743517c45c0a46b455d7a57c0b9891" -RELEASE_TIMESTAMP="20260506114755" +RELEASE_TAG="2e36c464a92f1942683abbed6ceb442308db5eb0" +RELEASE_TIMESTAMP="20260514160037"
