Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package MozillaFirefox for openSUSE:Factory 
checked in at 2026-02-26 18:37:06
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/MozillaFirefox (Old)
 and      /work/SRC/openSUSE:Factory/.MozillaFirefox.new.29461 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "MozillaFirefox"

Thu Feb 26 18:37:06 2026 rev:479 rq:1334868 version:148.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/MozillaFirefox/MozillaFirefox.changes    
2026-02-19 14:18:00.725412153 +0100
+++ /work/SRC/openSUSE:Factory/.MozillaFirefox.new.29461/MozillaFirefox.changes 
2026-02-26 18:37:27.097601221 +0100
@@ -1,0 +2,122 @@
+Mon Feb 23 19:35:36 UTC 2026 - Wolfgang Rosenauer <[email protected]>
+
+- Mozilla Firefox 148.0
+  * https://www.firefox.com/en-US/firefox/148.0/releasenotes
+  MFSA 2026-13 (bsc#1258568)
+  * CVE-2026-2757 (bmo#2001637)
+    Incorrect boundary conditions in the WebRTC: Audio/Video component
+  * CVE-2026-2794 (bmo#2008365)
+    Information disclosure due to uninitialized memory in Firefox
+    and Firefox Focus for Android
+  * CVE-2026-2758 (bmo#2009608)
+    Use-after-free in the JavaScript: GC component
+  * CVE-2026-2759 (bmo#2010933)
+    Incorrect boundary conditions in the Graphics: ImageLib component
+  * CVE-2026-2795 (bmo#2010940)
+    Use-after-free in the JavaScript: GC component
+  * CVE-2026-2760 (bmo#2011062)
+    Sandbox escape due to incorrect boundary conditions in the
+    Graphics: WebRender component
+  * CVE-2026-2761 (bmo#2011063)
+    Sandbox escape in the Graphics: WebRender component
+  * CVE-2026-2762 (bmo#2011649)
+    Integer overflow in the JavaScript: Standard Library component
+  * CVE-2026-2763 (bmo#2012018)
+    Use-after-free in the JavaScript Engine component
+  * CVE-2026-2764 (bmo#2012608)
+    JIT miscompilation, use-after-free in the JavaScript Engine:
+    JIT component
+  * CVE-2026-2796 (bmo#2013165)
+    JIT miscompilation in the JavaScript: WebAssembly component
+  * CVE-2026-2797 (bmo#2013561)
+    Use-after-free in the JavaScript: GC component
+  * CVE-2026-2765 (bmo#2013562)
+    Use-after-free in the JavaScript Engine component
+  * CVE-2026-2766 (bmo#2013583)
+    Use-after-free in the JavaScript Engine: JIT component
+  * CVE-2026-2767 (bmo#2013741)
+    Use-after-free in the JavaScript: WebAssembly component
+  * CVE-2026-2768 (bmo#2014101)
+    Sandbox escape in the Storage: IndexedDB component
+  * CVE-2026-2798 (bmo#2014136)
+    Use-after-free in the DOM: Core & HTML component
+  * CVE-2026-2769 (bmo#2014550)
+    Use-after-free in the Storage: IndexedDB component
+  * CVE-2026-2799 (bmo#2014551)
+    Use-after-free in the DOM: Core & HTML component
+  * CVE-2026-2770 (bmo#2014585)
+    Use-after-free in the DOM: Bindings (WebIDL) component
+  * CVE-2026-2771 (bmo#2014593)
+    Undefined behavior in the DOM: Core & HTML component
+  * CVE-2026-2772 (bmo#2014827)
+    Use-after-free in the Audio/Video: Playback component
+  * CVE-2026-2773 (bmo#2014832)
+    Incorrect boundary conditions in the Web Audio component
+  * CVE-2026-2774 (bmo#2014883)
+    Integer overflow in the Audio/Video component
+  * CVE-2026-2775 (bmo#2015199)
+    Mitigation bypass in the DOM: HTML Parser component
+  * CVE-2026-2776 (bmo#2015266)
+    Sandbox escape due to incorrect boundary conditions in the
+    Telemetry component in External Software
+  * CVE-2026-2777 (bmo#2015305)
+    Privilege escalation in the Messaging System component
+  * CVE-2026-2778 (bmo#2016358)
+    Sandbox escape due to incorrect boundary conditions in the
+    DOM: Core & HTML component
+  * CVE-2026-2779 (bmo#1164141)
+    Incorrect boundary conditions in the Networking: JAR component
+  * CVE-2026-2800 (bmo#1988145)
+    Spoofing issue in the WebAuthn component in Firefox for Android
+  * CVE-2026-2780 (bmo#2007829)
+    Privilege escalation in the Netmonitor component
+  * CVE-2026-2781 (bmo#2009552)
+    Integer overflow in the Libraries component in NSS
+  * CVE-2026-2801 (bmo#2009901)
+    Incorrect boundary conditions in the JavaScript: WebAssembly
+    component
+  * CVE-2026-2782 (bmo#2010743)
+    Privilege escalation in the Netmonitor component
+  * CVE-2026-2783 (bmo#2010943)
+    Information disclosure due to JIT miscompilation in the
+    JavaScript Engine: JIT component
+  * CVE-2026-2802 (bmo#2011069)
+    Race condition in the JavaScript: GC component
+  * CVE-2026-2803 (bmo#2012012)
+    Information disclosure, mitigation bypass in the Settings UI
+    component
+  * CVE-2026-2784 (bmo#2012984)
+    Mitigation bypass in the DOM: Security component
+  * CVE-2026-2785 (bmo#2013549)
+    Invalid pointer in the JavaScript Engine component
+  * CVE-2026-2804 (bmo#2013584)
+    Use-after-free in the JavaScript: WebAssembly component
+  * CVE-2026-2786 (bmo#2013612)
+    Use-after-free in the JavaScript Engine component
+  * CVE-2026-2805 (bmo#2014549)
+    Invalid pointer in the DOM: Core & HTML component
+  * CVE-2026-2787 (bmo#2014560)
+    Use-after-free in the DOM: Window and Location component
+  * CVE-2026-2788 (bmo#2014824)
+    Incorrect boundary conditions in the Audio/Video: GMP component
+  * CVE-2026-2789 (bmo#2015179)
+    Use-after-free in the Graphics: ImageLib component
+  * CVE-2026-2806 (bmo#2006199)
+    Uninitialized memory in the Graphics: Text component
+  * CVE-2026-2790 (bmo#2008426)
+    Same-origin policy bypass in the Networking: JAR component
+  * CVE-2026-2791 (bmo#2015220)
+    Mitigation bypass in the Networking: Cache component
+  * CVE-2026-2807 (bmo#1756056, bmo#1999402, bmo#2004872,
+    bmo#2006037, bmo#2012855)
+    Memory safety bugs fixed in Firefox 148 and Thunderbird 148
+  * CVE-2026-2792 (bmo#2008912, bmo#2010050, bmo#2010275, bmo#2012331)
+    Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird
+    ESR 140.8, Firefox 148 and Thunderbird 148
+  * CVE-2026-2793 (bmo#2015196, bmo#2016423, bmo#2016498)
+    Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR
+    140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148
+- requires NSS 3.120.1
+- added mozilla-breakpad.patch to fix build
+
+-------------------------------------------------------------------

Old:
----
  firefox-147.0.4.source.tar.xz
  firefox-147.0.4.source.tar.xz.asc
  l10n-147.0.4.tar.xz

New:
----
  firefox-148.0.source.tar.xz
  firefox-148.0.source.tar.xz.asc
  l10n-148.0.tar.xz
  mozilla-breakpad.patch

----------(New B)----------
  New:- requires NSS 3.120.1
- added mozilla-breakpad.patch to fix build
----------(New E)----------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ MozillaFirefox.spec ++++++
--- /var/tmp/diff_new_pack.reC96C/_old  2026-02-26 18:37:58.282891956 +0100
+++ /var/tmp/diff_new_pack.reC96C/_new  2026-02-26 18:37:58.286892121 +0100
@@ -28,9 +28,9 @@
 # orig_suffix b3
 # major 69
 # mainver %%major.99
-%define major          147
-%define mainver        %major.0.4
-%define orig_version   147.0.4
+%define major          148
+%define mainver        %major.0
+%define orig_version   148.0
 %define orig_suffix    %{nil}
 %define update_channel release
 %define branding       1
@@ -114,7 +114,7 @@
 BuildRequires:  libproxy-devel
 BuildRequires:  makeinfo
 BuildRequires:  mozilla-nspr-devel >= 4.38.2
-BuildRequires:  mozilla-nss-devel >= 3.119
+BuildRequires:  mozilla-nss-devel >= 3.120.1
 BuildRequires:  nasm >= 2.14
 BuildRequires:  nodejs >= 12.22.12
 %if 0%{?sle_version} >= 120000 && 0%{?sle_version} < 150000
@@ -229,6 +229,7 @@
 Patch20:        one_swizzle_to_rule_them_all.patch
 Patch21:        svg-rendering.patch
 Patch24:        mozilla-bmo1746799.patch
+Patch25:        mozilla-breakpad.patch
 # Firefox/browser
 Patch102:       firefox-branded-icons.patch
 %endif

++++++ firefox-147.0.4.source.tar.xz -> firefox-148.0.source.tar.xz ++++++
/work/SRC/openSUSE:Factory/MozillaFirefox/firefox-147.0.4.source.tar.xz 
/work/SRC/openSUSE:Factory/.MozillaFirefox.new.29461/firefox-148.0.source.tar.xz
 differ: char 15, line 1

++++++ l10n-147.0.4.tar.xz -> l10n-148.0.tar.xz ++++++
/work/SRC/openSUSE:Factory/MozillaFirefox/l10n-147.0.4.tar.xz 
/work/SRC/openSUSE:Factory/.MozillaFirefox.new.29461/l10n-148.0.tar.xz differ: 
char 15, line 1

++++++ mozilla-bmo1504834-part1.patch ++++++
--- /var/tmp/diff_new_pack.reC96C/_old  2026-02-26 18:37:58.546902883 +0100
+++ /var/tmp/diff_new_pack.reC96C/_new  2026-02-26 18:37:58.550903048 +0100
@@ -1,11 +1,11 @@
 # HG changeset patch
-# Parent  e31f5228a09ed69d7ac3c84e54f0faa6a5910ae0
+# Parent  30360f7dae4c2a1046c3327d73580b29fb4ac32e
 Taken from https://bugzilla.mozilla.org/show_bug.cgi?id=1504834
 
 diff --git a/gfx/2d/DrawTargetSkia.cpp b/gfx/2d/DrawTargetSkia.cpp
 --- a/gfx/2d/DrawTargetSkia.cpp
 +++ b/gfx/2d/DrawTargetSkia.cpp
-@@ -155,17 +155,18 @@ static IntRect CalculateSurfaceBounds(co
+@@ -156,17 +156,18 @@ static IntRect CalculateSurfaceBounds(co
    if (!sampledBounds.ToIntRect(&bounds)) {
      return surfaceBounds;
    }
@@ -28,11 +28,11 @@
 diff --git a/gfx/2d/Types.h b/gfx/2d/Types.h
 --- a/gfx/2d/Types.h
 +++ b/gfx/2d/Types.h
-@@ -94,28 +94,21 @@ enum class SurfaceFormat : int8_t {
-               // this format.
-   HSV,
-   Lab,
-   Depth,
+@@ -102,28 +102,21 @@ enum class SurfaceFormat : int8_t {
+   R10G10B10X2_UINT32,  // 0b00RRRRRRRRRRGGGGGGGGGGBBBBBBBBBB
+   // 4 half-float (f16) components in RGBA order for HDR rendering, each is
+   // machine endian.
+   R16G16B16A16F,
  
    // This represents the unknown format.
    UNKNOWN,  // TODO: Replace uses with Maybe<SurfaceFormat>.
@@ -82,7 +82,7 @@
  
  void skcms_DisableRuntimeCPUDetection() {
      sAllowRuntimeCPUDetection = false;
-@@ -319,30 +321,38 @@ enum {
+@@ -374,30 +376,38 @@ enum {
      skcms_Signature_sf32 = 0x73663332,
      // XYZ is also a PCS signature, so it's defined in skcms.h
      // skcms_Signature_XYZ = 0x58595A20,

++++++ mozilla-breakpad.patch ++++++
# HG changeset patch
# User Wolfgang Rosenauer <[email protected]>
# Parent  0582001f108d3435a346ca0937057e73051e4baf

diff --git 
a/toolkit/crashreporter/breakpad-client/linux/handler/minidump_descriptor.h 
b/toolkit/crashreporter/breakpad-client/linux/handler/minidump_descriptor.h
--- a/toolkit/crashreporter/breakpad-client/linux/handler/minidump_descriptor.h
+++ b/toolkit/crashreporter/breakpad-client/linux/handler/minidump_descriptor.h
@@ -27,16 +27,17 @@
 // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
 // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 
 #ifndef CLIENT_LINUX_HANDLER_MINIDUMP_DESCRIPTOR_H_
 #define CLIENT_LINUX_HANDLER_MINIDUMP_DESCRIPTOR_H_
 
 #include <assert.h>
 #include <sys/types.h>
+#include <cstdint>
 
 #include <string>
 
 #include "linux/handler/microdump_extra_info.h"
 #include "common/using_std_string.h"
 
 // This class describes how a crash dump should be generated, either:
 // - Writing a full minidump to a file in a given directory (the actual path,

++++++ tar_stamps ++++++
--- /var/tmp/diff_new_pack.reC96C/_old  2026-02-26 18:37:58.658907518 +0100
+++ /var/tmp/diff_new_pack.reC96C/_new  2026-02-26 18:37:58.662907684 +0100
@@ -1,11 +1,11 @@
 PRODUCT="firefox"
 CHANNEL="release"
-VERSION="147.0.4"
+VERSION="148.0"
 VERSION_SUFFIX=""
-PREV_VERSION="147.0.3"
+PREV_VERSION="147.0.4"
 PREV_VERSION_SUFFIX=""
 #SKIP_LOCALES="" # Uncomment to skip l10n and compare-locales-generation
 RELEASE_REPO="https://hg.mozilla.org/releases/mozilla-release";
-RELEASE_TAG="fc43c97c72749b9e222d68e0d37e7c696ae933e2"
-RELEASE_TIMESTAMP="20260212191108"
+RELEASE_TAG="eff69d257e44ce2a29f947baf876e992af8bb9b0"
+RELEASE_TIMESTAMP="20260216153405"
 

Reply via email to