Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package xen for openSUSE:Factory checked in 
at 2026-03-28 20:13:23
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/xen (Old)
 and      /work/SRC/openSUSE:Factory/.xen.new.8177 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "xen"

Sat Mar 28 20:13:23 2026 rev:372 rq:1343059 version:4.21.1_02

Changes:
--------
--- /work/SRC/openSUSE:Factory/xen/xen.changes  2026-01-29 17:45:00.913511262 
+0100
+++ /work/SRC/openSUSE:Factory/.xen.new.8177/xen.changes        2026-03-28 
20:14:38.488618340 +0100
@@ -1,0 +2,15 @@
+Thu Mar 26 14:00:19 MDT 2026 - [email protected]
+
+- Update to Xen 4.21.1 bug fix release (bsc#1027519)
+  * No upstream changelog found in sources or webpage
+- Drop patches contained in new tarball
+  xsa477.patch
+  xsa479.patch
+  glibc2.43-fixes.patch
+- Includes security fixes for the following bugs
+  bsc#1259247 - VUL-0: CVE-2026-23554: xen: Use after free of
+  paging structures in EPT (XSA-480)
+  bsc#1259248 - VUL-0: CVE-2026-23555: xen: Xenstored DoS by
+  unprivileged domain (XSA-481)
+
+-------------------------------------------------------------------

Old:
----
  glibc2.43-fixes.patch
  xen-4.21.0-testing-src.tar.bz2
  xsa477.patch
  xsa479.patch

New:
----
  xen-4.21.1-testing-src.tar.bz2

----------(Old B)----------
  Old:  xsa479.patch
  glibc2.43-fixes.patch
- Includes security fixes for the following bugs
  Old:- Drop patches contained in new tarball
  xsa477.patch
  xsa479.patch
  Old:  xsa477.patch
  xsa479.patch
  glibc2.43-fixes.patch
----------(Old E)----------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ xen.spec ++++++
--- /var/tmp/diff_new_pack.ywiouB/_old  2026-03-28 20:14:40.088684377 +0100
+++ /var/tmp/diff_new_pack.ywiouB/_new  2026-03-28 20:14:40.088684377 +0100
@@ -30,7 +30,7 @@
 
 Name:           xen
 ExclusiveArch:  %ix86 x86_64 aarch64
-%define xen_build_dir xen-4.21.0-testing
+%define xen_build_dir xen-4.21.1-testing
 #
 %define with_gdbsx 0
 %define with_dom0_support 0
@@ -125,12 +125,12 @@
 BuildRequires:  python-rpm-macros
 Provides:       installhint(reboot-needed)
 
-Version:        4.21.0_04
+Version:        4.21.1_02
 Release:        0
 Summary:        Xen Virtualization: Hypervisor (aka VMM aka Microkernel)
 License:        GPL-2.0-only
 Group:          System/Kernel
-Source0:        xen-4.21.0-testing-src.tar.bz2
+Source0:        xen-4.21.1-testing-src.tar.bz2
 Source1:        stubdom.tar.bz2
 Source2:        mini-os.tar.bz2
 Source9:        xen.changes
@@ -160,8 +160,6 @@
 # For xen-libs
 Source99:       baselibs.conf
 # Upstream patches
-Patch1:         xsa477.patch
-Patch2:         xsa479.patch
 # EMBARGOED security fixes
 # Our platform specific patches
 Patch400:       xen-destdir.patch
@@ -193,7 +191,6 @@
 Patch602:       xenwatchdogd-restart.patch
 Patch621:       xen.build-compare.doc_html.patch
 # Build patches
-Patch800:       glibc2.43-fixes.patch
 URL:            http://www.cl.cam.ac.uk/Research/SRG/netos/xen/
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 %define pyver %(python3 -c "import sys; print(sys.version.rpartition('.')[0])")

++++++ xen-4.21.0-testing-src.tar.bz2 -> xen-4.21.1-testing-src.tar.bz2 ++++++
++++ 4862 lines of diff (skipped)

++++++ xen.bug1026236.suse_vtsc_tolerance.patch ++++++
--- /var/tmp/diff_new_pack.ywiouB/_old  2026-03-28 20:14:43.380820249 +0100
+++ /var/tmp/diff_new_pack.ywiouB/_new  2026-03-28 20:14:43.384820415 +0100
@@ -20,7 +20,7 @@
  unsigned long __read_mostly cpu_khz;  /* CPU clock frequency in kHz. */
  DEFINE_SPINLOCK(rtc_lock);
  unsigned long pit0_ticks;
-@@ -2928,6 +2931,8 @@ int tsc_set_info(struct domain *d,
+@@ -2933,6 +2936,8 @@ int tsc_set_info(struct domain *d,
  
      switch ( tsc_mode )
      {
@@ -29,7 +29,7 @@
      case XEN_CPUID_TSC_MODE_DEFAULT:
      case XEN_CPUID_TSC_MODE_ALWAYS_EMULATE:
          d->arch.vtsc_offset = get_s_time() - elapsed_nsec;
-@@ -2941,8 +2946,25 @@ int tsc_set_info(struct domain *d,
+@@ -2946,8 +2951,25 @@ int tsc_set_info(struct domain *d,
           * When a guest is created, gtsc_khz is passed in as zero, making
           * d->arch.tsc_khz == cpu_khz. Thus no need to check incarnation.
           */

Reply via email to