Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package glib2 for openSUSE:Factory checked 
in at 2026-02-18 17:05:23
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/glib2 (Old)
 and      /work/SRC/openSUSE:Factory/.glib2.new.1977 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "glib2"

Wed Feb 18 17:05:23 2026 rev:303 rq:1333533 version:2.86.4

Changes:
--------
--- /work/SRC/openSUSE:Factory/glib2/glib2.changes      2026-01-29 
17:44:08.587317723 +0100
+++ /work/SRC/openSUSE:Factory/.glib2.new.1977/glib2.changes    2026-02-18 
17:06:32.332493320 +0100
@@ -1,0 +2,11 @@
+Sat Feb 14 09:48:50 UTC 2026 - Bjørn Lie <[email protected]>
+
+- Update to version 2.86.4:
+  + Fix several security vulnerabilities of varying severity
+  + Updated translations.
+- Drop patches fixed upstream:
+  + glib2-CVE-2026-1484.patch
+  + glib2-CVE-2026-1485.patch
+  + glib2-CVE-2026-1489.patch
+
+-------------------------------------------------------------------

Old:
----
  glib-2.86.3.obscpio
  glib2-CVE-2026-1484.patch
  glib2-CVE-2026-1485.patch
  glib2-CVE-2026-1489.patch

New:
----
  glib-2.86.4.obscpio

----------(Old B)----------
  Old:- Drop patches fixed upstream:
  + glib2-CVE-2026-1484.patch
  + glib2-CVE-2026-1485.patch
  Old:  + glib2-CVE-2026-1484.patch
  + glib2-CVE-2026-1485.patch
  + glib2-CVE-2026-1489.patch
  Old:  + glib2-CVE-2026-1485.patch
  + glib2-CVE-2026-1489.patch
----------(Old E)----------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ glib2.spec ++++++
--- /var/tmp/diff_new_pack.O1X8i2/_old  2026-02-18 17:06:34.084566243 +0100
+++ /var/tmp/diff_new_pack.O1X8i2/_new  2026-02-18 17:06:34.084566243 +0100
@@ -37,7 +37,7 @@
 %define libgthread libgthread-%{libver}
 %define libgirepository libgirepository-%{libver}
 Name:           glib2%{psuffix}
-Version:        2.86.3
+Version:        2.86.4
 Release:        0
 Summary:        General-Purpose Utility Library
 License:        LGPL-2.1-or-later
@@ -67,12 +67,7 @@
 Patch4:         glib2-gdbus-codegen-version.patch
 # PATCH-FIX-UPSTREAM glib2-CVE-2026-0988.patch bsc#1256049 [email protected] -- 
fix a potential integer overflow in g_buffered_input_stream_peek.
 Patch5:         glib2-CVE-2026-0988.patch
-# PATCH-FIX-UPSTREAM glib2-CVE-2026-1484.patch bsc#1257355 [email protected] -- 
fix potential overflow in base64 encoding.
-Patch6:         glib2-CVE-2026-1484.patch
-# PATCH-FIX-UPSTREAM glib2-CVE-2026-1485.patch bsc#1257354 [email protected] -- 
fix underflow in content parsing logic.
-Patch7:         glib2-CVE-2026-1485.patch
-# PATCH-FIX-UPSTREAM glib2-CVE-2026-1489.patch bsc#1257353 [email protected] -- 
fix overflow with Unicode case conversion.
-Patch8:         glib2-CVE-2026-1489.patch
+
 BuildRequires:  docbook-xsl-stylesheets
 BuildRequires:  fdupes
 BuildRequires:  gcc-c++

++++++ _service ++++++
--- /var/tmp/diff_new_pack.O1X8i2/_old  2026-02-18 17:06:34.152569074 +0100
+++ /var/tmp/diff_new_pack.O1X8i2/_new  2026-02-18 17:06:34.156569240 +0100
@@ -3,7 +3,7 @@
   <service name="obs_scm" mode="manual">
     <param name="scm">git</param>
     <param name="url">https://gitlab.gnome.org/GNOME/glib.git</param>
-    <param name="revision">2.86.3</param>
+    <param name="revision">2.86.4</param>
     <param name="versionformat">@PARENT_TAG@+@TAG_OFFSET@</param>
     <param name="versionrewrite-pattern">(.*)\+0</param>
     <param name="versionrewrite-replacement">\1</param>

++++++ glib-2.86.3.obscpio -> glib-2.86.4.obscpio ++++++
++++ 10201 lines of diff (skipped)

++++++ glib.obsinfo ++++++
--- /var/tmp/diff_new_pack.O1X8i2/_old  2026-02-18 17:06:37.924726075 +0100
+++ /var/tmp/diff_new_pack.O1X8i2/_new  2026-02-18 17:06:37.940726741 +0100
@@ -1,5 +1,5 @@
 name: glib
-version: 2.86.3
-mtime: 1765208766
-commit: 7a54787e16ceb20cecda8ad6caab05b24a61e414
+version: 2.86.4
+mtime: 1771009696
+commit: 9152ae3c9f1eb890d6c7533920e20997698fd73d
 

Reply via email to