Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package firefox-esr for openSUSE:Factory 
checked in at 2026-02-24 18:30:41
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/firefox-esr (Old)
 and      /work/SRC/openSUSE:Factory/.firefox-esr.new.1977 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "firefox-esr"

Tue Feb 24 18:30:41 2026 rev:29 rq:1334755 version:140.8.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/firefox-esr/MozillaFirefox.changes       
2026-02-17 16:47:08.070891588 +0100
+++ /work/SRC/openSUSE:Factory/.firefox-esr.new.1977/MozillaFirefox.changes     
2026-02-24 18:30:42.082501928 +0100
@@ -1,0 +2,96 @@
+Tue Feb 24 13:56:01 UTC 2026 - Manfred Hollstein <[email protected]>
+
+- Firefox Extended Support Release 140.8.0 ESR
+  * Fixed: Various security fixes.
+- Mozilla Firefox ESR 140.8
+  https://www.mozilla.org/security/advisories/mfsa2026-15
+  MFSA 2026-15 (boo#1258568)
+  * CVE-2026-2757 (bmo#2001637)
+    Incorrect boundary conditions in the WebRTC: Audio/Video
+    component
+  * CVE-2026-2758 (bmo#2009608)
+    Use-after-free in the JavaScript: GC component
+  * CVE-2026-2759 (bmo#2010933)
+    Incorrect boundary conditions in the Graphics: ImageLib
+    component
+  * CVE-2026-2760 (bmo#2011062)
+    Sandbox escape due to incorrect boundary conditions in the
+    Graphics: WebRender component
+  * CVE-2026-2761 (bmo#2011063)
+    Sandbox escape in the Graphics: WebRender component
+  * CVE-2026-2762 (bmo#2011649)
+    Integer overflow in the JavaScript: Standard Library
+    component
+  * CVE-2026-2763 (bmo#2012018)
+    Use-after-free in the JavaScript Engine component
+  * CVE-2026-2764 (bmo#2012608)
+    JIT miscompilation, use-after-free in the JavaScript Engine:
+    JIT component
+  * CVE-2026-2765 (bmo#2013562)
+    Use-after-free in the JavaScript Engine component
+  * CVE-2026-2766 (bmo#2013583)
+    Use-after-free in the JavaScript Engine: JIT component
+  * CVE-2026-2767 (bmo#2013741)
+    Use-after-free in the JavaScript: WebAssembly component
+  * CVE-2026-2768 (bmo#2014101)
+    Sandbox escape in the Storage: IndexedDB component
+  * CVE-2026-2769 (bmo#2014550)
+    Use-after-free in the Storage: IndexedDB component
+  * CVE-2026-2770 (bmo#2014585)
+    Use-after-free in the DOM: Bindings (WebIDL) component
+  * CVE-2026-2771 (bmo#2014593)
+    Undefined behavior in the DOM: Core & HTML component
+  * CVE-2026-2772 (bmo#2014827)
+    Use-after-free in the Audio/Video: Playback component
+  * CVE-2026-2773 (bmo#2014832)
+    Incorrect boundary conditions in the Web Audio component
+  * CVE-2026-2774 (bmo#2014883)
+    Integer overflow in the Audio/Video component
+  * CVE-2026-2775 (bmo#2015199)
+    Mitigation bypass in the DOM: HTML Parser component
+  * CVE-2026-2776 (bmo#2015266)
+    Sandbox escape due to incorrect boundary conditions in the
+    Telemetry component in External Software
+  * CVE-2026-2777 (bmo#2015305)
+    Privilege escalation in the Messaging System component
+  * CVE-2026-2778 (bmo#2016358)
+    Sandbox escape due to incorrect boundary conditions in the
+    DOM: Core & HTML component
+  * CVE-2026-2779 (bmo#1164141)
+    Incorrect boundary conditions in the Networking: JAR
+    component
+  * CVE-2026-2780 (bmo#2007829)
+    Privilege escalation in the Netmonitor component
+  * CVE-2026-2781 (bmo#2009552)
+    Integer overflow in the Libraries component in NSS
+  * CVE-2026-2782 (bmo#2010743)
+    Privilege escalation in the Netmonitor component
+  * CVE-2026-2783 (bmo#2010943)
+    Information disclosure due to JIT miscompilation in the
+    JavaScript Engine: JIT component
+  * CVE-2026-2784 (bmo#2012984)
+    Mitigation bypass in the DOM: Security component
+  * CVE-2026-2785 (bmo#2013549)
+    Invalid pointer in the JavaScript Engine component
+  * CVE-2026-2786 (bmo#2013612)
+    Use-after-free in the JavaScript Engine component
+  * CVE-2026-2787 (bmo#2014560)
+    Use-after-free in the DOM: Window and Location component
+  * CVE-2026-2788 (bmo#2014824)
+    Incorrect boundary conditions in the Audio/Video: GMP
+    component
+  * CVE-2026-2789 (bmo#2015179)
+    Use-after-free in the Graphics: ImageLib component
+  * CVE-2026-2790 (bmo#2008426)
+    Same-origin policy bypass in the Networking: JAR component
+  * CVE-2026-2791 (bmo#2015220)
+    Mitigation bypass in the Networking: Cache component
+  * CVE-2026-2792 (bmo#2008912, bmo#2010050, bmo#2010275,
+    bmo#2012331)
+    Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird
+    ESR 140.8, Firefox 148 and Thunderbird 148
+  * CVE-2026-2793 (bmo#2015196, bmo#2016423, bmo#2016498)
+    Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR
+    140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148
+
+-------------------------------------------------------------------
firefox-esr.changes: same change

Old:
----
  firefox-140.7.1esr.source.tar.xz
  firefox-140.7.1esr.source.tar.xz.asc
  l10n-140.7.1esr.tar.xz

New:
----
  firefox-140.8.0esr.source.tar.xz
  firefox-140.8.0esr.source.tar.xz.asc
  l10n-140.8.0esr.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ firefox-esr.spec ++++++
--- /var/tmp/diff_new_pack.5VxAJU/_old  2026-02-24 18:31:19.972079862 +0100
+++ /var/tmp/diff_new_pack.5VxAJU/_new  2026-02-24 18:31:19.972079862 +0100
@@ -41,8 +41,8 @@
 # major 69
 # mainver %%major.99
 %define major          140
-%define mainver        %major.7.1
-%define orig_version   140.7.1
+%define mainver        %major.8.0
+%define orig_version   140.8.0
 %define orig_suffix    esr
 %define update_channel esr
 %define branding       1

++++++ MozillaFirefox.changes.txt ++++++
--- /var/tmp/diff_new_pack.5VxAJU/_old  2026-02-24 18:31:20.132086527 +0100
+++ /var/tmp/diff_new_pack.5VxAJU/_new  2026-02-24 18:31:20.140086860 +0100
@@ -1,4 +1,100 @@
 -------------------------------------------------------------------
+Tue Feb 24 13:56:01 UTC 2026 - Manfred Hollstein <[email protected]>
+
+- Firefox Extended Support Release 140.8.0 ESR
+  * Fixed: Various security fixes.
+- Mozilla Firefox ESR 140.8
+  https://www.mozilla.org/security/advisories/mfsa2026-15
+  MFSA 2026-15 (boo#1258568)
+  * CVE-2026-2757 (bmo#2001637)
+    Incorrect boundary conditions in the WebRTC: Audio/Video
+    component
+  * CVE-2026-2758 (bmo#2009608)
+    Use-after-free in the JavaScript: GC component
+  * CVE-2026-2759 (bmo#2010933)
+    Incorrect boundary conditions in the Graphics: ImageLib
+    component
+  * CVE-2026-2760 (bmo#2011062)
+    Sandbox escape due to incorrect boundary conditions in the
+    Graphics: WebRender component
+  * CVE-2026-2761 (bmo#2011063)
+    Sandbox escape in the Graphics: WebRender component
+  * CVE-2026-2762 (bmo#2011649)
+    Integer overflow in the JavaScript: Standard Library
+    component
+  * CVE-2026-2763 (bmo#2012018)
+    Use-after-free in the JavaScript Engine component
+  * CVE-2026-2764 (bmo#2012608)
+    JIT miscompilation, use-after-free in the JavaScript Engine:
+    JIT component
+  * CVE-2026-2765 (bmo#2013562)
+    Use-after-free in the JavaScript Engine component
+  * CVE-2026-2766 (bmo#2013583)
+    Use-after-free in the JavaScript Engine: JIT component
+  * CVE-2026-2767 (bmo#2013741)
+    Use-after-free in the JavaScript: WebAssembly component
+  * CVE-2026-2768 (bmo#2014101)
+    Sandbox escape in the Storage: IndexedDB component
+  * CVE-2026-2769 (bmo#2014550)
+    Use-after-free in the Storage: IndexedDB component
+  * CVE-2026-2770 (bmo#2014585)
+    Use-after-free in the DOM: Bindings (WebIDL) component
+  * CVE-2026-2771 (bmo#2014593)
+    Undefined behavior in the DOM: Core & HTML component
+  * CVE-2026-2772 (bmo#2014827)
+    Use-after-free in the Audio/Video: Playback component
+  * CVE-2026-2773 (bmo#2014832)
+    Incorrect boundary conditions in the Web Audio component
+  * CVE-2026-2774 (bmo#2014883)
+    Integer overflow in the Audio/Video component
+  * CVE-2026-2775 (bmo#2015199)
+    Mitigation bypass in the DOM: HTML Parser component
+  * CVE-2026-2776 (bmo#2015266)
+    Sandbox escape due to incorrect boundary conditions in the
+    Telemetry component in External Software
+  * CVE-2026-2777 (bmo#2015305)
+    Privilege escalation in the Messaging System component
+  * CVE-2026-2778 (bmo#2016358)
+    Sandbox escape due to incorrect boundary conditions in the
+    DOM: Core & HTML component
+  * CVE-2026-2779 (bmo#1164141)
+    Incorrect boundary conditions in the Networking: JAR
+    component
+  * CVE-2026-2780 (bmo#2007829)
+    Privilege escalation in the Netmonitor component
+  * CVE-2026-2781 (bmo#2009552)
+    Integer overflow in the Libraries component in NSS
+  * CVE-2026-2782 (bmo#2010743)
+    Privilege escalation in the Netmonitor component
+  * CVE-2026-2783 (bmo#2010943)
+    Information disclosure due to JIT miscompilation in the
+    JavaScript Engine: JIT component
+  * CVE-2026-2784 (bmo#2012984)
+    Mitigation bypass in the DOM: Security component
+  * CVE-2026-2785 (bmo#2013549)
+    Invalid pointer in the JavaScript Engine component
+  * CVE-2026-2786 (bmo#2013612)
+    Use-after-free in the JavaScript Engine component
+  * CVE-2026-2787 (bmo#2014560)
+    Use-after-free in the DOM: Window and Location component
+  * CVE-2026-2788 (bmo#2014824)
+    Incorrect boundary conditions in the Audio/Video: GMP
+    component
+  * CVE-2026-2789 (bmo#2015179)
+    Use-after-free in the Graphics: ImageLib component
+  * CVE-2026-2790 (bmo#2008426)
+    Same-origin policy bypass in the Networking: JAR component
+  * CVE-2026-2791 (bmo#2015220)
+    Mitigation bypass in the Networking: Cache component
+  * CVE-2026-2792 (bmo#2008912, bmo#2010050, bmo#2010275,
+    bmo#2012331)
+    Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird
+    ESR 140.8, Firefox 148 and Thunderbird 148
+  * CVE-2026-2793 (bmo#2015196, bmo#2016423, bmo#2016498)
+    Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR
+    140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148
+
+-------------------------------------------------------------------
 Mon Feb 16 10:29:19 UTC 2026 - Manfred Hollstein <[email protected]>
 
 - Firefox Extended Support Release 140.7.1 ESR

++++++ firefox-140.7.1esr.source.tar.xz -> firefox-140.8.0esr.source.tar.xz 
++++++
/work/SRC/openSUSE:Factory/firefox-esr/firefox-140.7.1esr.source.tar.xz 
/work/SRC/openSUSE:Factory/.firefox-esr.new.1977/firefox-140.8.0esr.source.tar.xz
 differ: char 15, line 1

++++++ firefox-esr.changes.txt ++++++
--- /var/tmp/diff_new_pack.5VxAJU/_old  2026-02-24 18:31:20.324094522 +0100
+++ /var/tmp/diff_new_pack.5VxAJU/_new  2026-02-24 18:31:20.328094690 +0100
@@ -1,4 +1,100 @@
 -------------------------------------------------------------------
+Tue Feb 24 13:56:01 UTC 2026 - Manfred Hollstein <[email protected]>
+
+- Firefox Extended Support Release 140.8.0 ESR
+  * Fixed: Various security fixes.
+- Mozilla Firefox ESR 140.8
+  https://www.mozilla.org/security/advisories/mfsa2026-15
+  MFSA 2026-15 (boo#1258568)
+  * CVE-2026-2757 (bmo#2001637)
+    Incorrect boundary conditions in the WebRTC: Audio/Video
+    component
+  * CVE-2026-2758 (bmo#2009608)
+    Use-after-free in the JavaScript: GC component
+  * CVE-2026-2759 (bmo#2010933)
+    Incorrect boundary conditions in the Graphics: ImageLib
+    component
+  * CVE-2026-2760 (bmo#2011062)
+    Sandbox escape due to incorrect boundary conditions in the
+    Graphics: WebRender component
+  * CVE-2026-2761 (bmo#2011063)
+    Sandbox escape in the Graphics: WebRender component
+  * CVE-2026-2762 (bmo#2011649)
+    Integer overflow in the JavaScript: Standard Library
+    component
+  * CVE-2026-2763 (bmo#2012018)
+    Use-after-free in the JavaScript Engine component
+  * CVE-2026-2764 (bmo#2012608)
+    JIT miscompilation, use-after-free in the JavaScript Engine:
+    JIT component
+  * CVE-2026-2765 (bmo#2013562)
+    Use-after-free in the JavaScript Engine component
+  * CVE-2026-2766 (bmo#2013583)
+    Use-after-free in the JavaScript Engine: JIT component
+  * CVE-2026-2767 (bmo#2013741)
+    Use-after-free in the JavaScript: WebAssembly component
+  * CVE-2026-2768 (bmo#2014101)
+    Sandbox escape in the Storage: IndexedDB component
+  * CVE-2026-2769 (bmo#2014550)
+    Use-after-free in the Storage: IndexedDB component
+  * CVE-2026-2770 (bmo#2014585)
+    Use-after-free in the DOM: Bindings (WebIDL) component
+  * CVE-2026-2771 (bmo#2014593)
+    Undefined behavior in the DOM: Core & HTML component
+  * CVE-2026-2772 (bmo#2014827)
+    Use-after-free in the Audio/Video: Playback component
+  * CVE-2026-2773 (bmo#2014832)
+    Incorrect boundary conditions in the Web Audio component
+  * CVE-2026-2774 (bmo#2014883)
+    Integer overflow in the Audio/Video component
+  * CVE-2026-2775 (bmo#2015199)
+    Mitigation bypass in the DOM: HTML Parser component
+  * CVE-2026-2776 (bmo#2015266)
+    Sandbox escape due to incorrect boundary conditions in the
+    Telemetry component in External Software
+  * CVE-2026-2777 (bmo#2015305)
+    Privilege escalation in the Messaging System component
+  * CVE-2026-2778 (bmo#2016358)
+    Sandbox escape due to incorrect boundary conditions in the
+    DOM: Core & HTML component
+  * CVE-2026-2779 (bmo#1164141)
+    Incorrect boundary conditions in the Networking: JAR
+    component
+  * CVE-2026-2780 (bmo#2007829)
+    Privilege escalation in the Netmonitor component
+  * CVE-2026-2781 (bmo#2009552)
+    Integer overflow in the Libraries component in NSS
+  * CVE-2026-2782 (bmo#2010743)
+    Privilege escalation in the Netmonitor component
+  * CVE-2026-2783 (bmo#2010943)
+    Information disclosure due to JIT miscompilation in the
+    JavaScript Engine: JIT component
+  * CVE-2026-2784 (bmo#2012984)
+    Mitigation bypass in the DOM: Security component
+  * CVE-2026-2785 (bmo#2013549)
+    Invalid pointer in the JavaScript Engine component
+  * CVE-2026-2786 (bmo#2013612)
+    Use-after-free in the JavaScript Engine component
+  * CVE-2026-2787 (bmo#2014560)
+    Use-after-free in the DOM: Window and Location component
+  * CVE-2026-2788 (bmo#2014824)
+    Incorrect boundary conditions in the Audio/Video: GMP
+    component
+  * CVE-2026-2789 (bmo#2015179)
+    Use-after-free in the Graphics: ImageLib component
+  * CVE-2026-2790 (bmo#2008426)
+    Same-origin policy bypass in the Networking: JAR component
+  * CVE-2026-2791 (bmo#2015220)
+    Mitigation bypass in the Networking: Cache component
+  * CVE-2026-2792 (bmo#2008912, bmo#2010050, bmo#2010275,
+    bmo#2012331)
+    Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird
+    ESR 140.8, Firefox 148 and Thunderbird 148
+  * CVE-2026-2793 (bmo#2015196, bmo#2016423, bmo#2016498)
+    Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR
+    140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148
+
+-------------------------------------------------------------------
 Mon Feb 16 10:29:19 UTC 2026 - Manfred Hollstein <[email protected]>
 
 - Firefox Extended Support Release 140.7.1 ESR

++++++ l10n-140.7.1esr.tar.xz -> l10n-140.8.0esr.tar.xz ++++++

++++++ tar_stamps ++++++
--- /var/tmp/diff_new_pack.5VxAJU/_old  2026-02-24 18:31:20.648108017 +0100
+++ /var/tmp/diff_new_pack.5VxAJU/_new  2026-02-24 18:31:20.656108350 +0100
@@ -1,11 +1,11 @@
 PRODUCT="firefox"
 CHANNEL="esr140"
-VERSION="140.7.1"
+VERSION="140.8.0"
 VERSION_SUFFIX="esr"
-PREV_VERSION="140.7.0"
+PREV_VERSION="140.7.1"
 PREV_VERSION_SUFFIX="esr"
 #SKIP_LOCALES="" # Uncomment to skip l10n and compare-locales-generation
 RELEASE_REPO="https://hg.mozilla.org/releases/mozilla-esr140";
-RELEASE_TAG="b52fd675e52fc0313972c4d53bd33baa216c241d"
-RELEASE_TIMESTAMP="20260212191416"
+RELEASE_TAG="b23aff4bbac16e44f2a9d3127c18616acfef6166"
+RELEASE_TIMESTAMP="20260217105505"
 

Reply via email to