The fix, which was proposed as a test to resolve some of the issues encountered, has been integrated into an official update candidate which will be released to everyone next time we publish updates. For more information on this update, you can consult the following post: https://xcp-ng.org/forum/post/96135

gduperrey
@gduperrey
Stormi's helper.
Science-Fiction and Fantasy lover. Love books, comics, animes...
Best posts made by gduperrey
-
RE: Epyc VM to VM networking slow
-
RE: High Fan Speed Issue on Lenovo ThinkSystem Servers
The
kernel
RPM integrating the patch is now available on thexcp-ng-testing
repo. So you can already upgrade and use it. To do this, here are the commands:yum clean metadata --enablerepo=xcp-ng-testing yum update kernel --enablerepo=xcp-ng-testing reboot
It will be released to all our users in an upcoming security update or update train. We don't have a date yet.
-
RE: XCP-ng 8.3 updates announcements and testing
Updates published: https://xcp-ng.org/blog/2025/07/03/july-2025-security-and-maintenance-update-for-xcp-ng-8-3-lts/
Thank you for the tests!
-
RE: XCP-ng 8.2 updates announcements and testing
New update candidates for you to test!
As you may know, we group non-urgent updates together for a collective release, in order not to cause unnecessary maintenance for our users.
The moment to release such a batch has come, so here they are, ready for user tests before the final release.
XAPI
:- Synced with XS82ECU1074
- Enhancement: robustification of the command
xe host-emergency-ha-disable
- Correction of different issues:
- Performing a hard shutdown of a VM may hang due to unnecessary RBCA permission checks. An icon (yellow triangle) may then be displayed on some management applications, indicating that the shutdown process did not complete successfully.
- Canceling a hard shutdown of a hung VM fails because the cancel function only checks for proper shutdowns.
- Migrating VMs from 8.2.1 to 8.3 with the
xe vm-migrate
command may fail with the error 'Failure: Unknown tag/contents'. - You may encounter a 500 error (internal server error) when trying to retrieve RRD measurements from a powered off virtual machine.
- Enhancement: robustification of the command
- Synced with XS82ECU1074
xsconsole
:- Synced with XS82ECU1074: Fix for a time-out when creating an iSCSI SR.
guest-templates-json
:- Add generic templates for Linux BIOS and UEFI
- Synced with XS82ECU1085:
- Oracle 8 requires minimum 2 vCPUS.
- Added template for Ubuntu 24.04
sm
:- Synced with XS82ECU1075
- Updated multipath.conf for several SANs
- Fix for CA-393194: Find the real PV in a VG before removing the VG.
- Synced with XS82ECU1075
blktap
: Synced with XS82ECU1075: Improvements on coalesce performance.curl
: Backport fixes for several CVE: CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-7264openssl
: Update to version 1.0.2k-26 from CentOS 7 updates and backports of available CVE fixes from openssl upstream. Update from CentOS 7 Includes fixes for CVE-2021-3712, CVE-2022-2078 and CVE-2023-0286. Backport are fixing CVE-2019-1547, CVE-2019-1551 and CVE-2019-1563.xs-openssl
: Rebased on version 1.1.1k-12 from CentOS 8 Stream. Include fixes for CVE-2023-5678, CVE-2023-3446, CVE-2023-3817 and a proper fix for CVE-2020-25659.zstd
: Update to version 1.5.5 to avoid an extremely rare cases of corruptionxcp-ng-xapi-plugins
: Enhance error reporting when a command run on a host fails.xenserver-status-report
: Update to latest version, synced with XS82ECU1058python-defusedxml
: Added as a new dependency ofxenserver-status-report
.- Alternate Drivers: Updated to newer versions.
intel-i40e-alt
: From version 2.22.20-3.1 to 2.22.20-5.1mellanox-mlnxen-alt
: From version 5.9.0.5.5.0-1.1 to 5.9.0.5.5.0-1.2- More information about drivers and current versions is on the drivers page: (https://github.com/xcp-ng/xcp/wiki/Drivers).
- New alternate driver
mlx4-modules-alt
: To resolve some issues with CX3 cards and SR-IOV, we added an updated version 4.9-7.1.0.0-LTS of this driver. - kernel-alt: Backport of a fix to correct cooling fan rotation speed on some Lenovo servers. For more information, you can read this thread on the forum.
As a dependency of XOSTOR:
http-nbd-transfer
:- Try to open device and start HTTP server before notifying the user
- Install pyc and pyo files
Test on XCP-ng 8.2
From an up to date host:
yum clean metadata --enablerepo=xcp-ng-testing,xcp-ng-candidates yum update --enablerepo=xcp-ng-testing,xcp-ng-candidates reboot
The usual update rules apply: pool coordinator first, etc.
Versions
blktap
: 3.37.4-4.1.xcpng8.2curl
: 8.6.0-2.2.xcpng8.2forkexecd
: 1.18.3-12.1.xcpng8.2gpumon
: 0.18.0-20.1.xcpng8.2guest-templates-json
: 1.10.7-1.2.xcpng8.2http-nbd-transfer
: 1.4.0-1.xcpng8.2message-switch
: 1.23.2-19.1.xcpng8.2ocaml-rrd-transport
: 1.16.1-17.1.xcpng8.2ocaml-rrdd-plugin
: 1.9.1-17.1.xcpng8.2ocaml-tapctl
: 1.5.1-17.1.xcpng8.2ocaml-xcp-idl
: 1.96.7-6.1.xcpng8.2ocaml-xen-api-client
: 1.9.0-20.1.xcpng8.2ocaml-xen-api-libs-transitional
: 2.25.7-1.1.xcpng8.2openssl
: 1.0.2k-26.2.xcpng8.2python-defusedxml
: 0.7.1-1.xcpng8.2rrd2csv
: 1.2.6-17.1.xcpng8.2rrdd-plugins
: 1.10.9-14.1.xcpng8.2sm
: 2.30.8-13.1.xcpng8.2sm-cli
: 0.23.0-63.1.xcpng8.2squeezed
: 0.27.0-20.1.xcpng8.2varstored-guard
: 0.6.2-17.xcpng8.2vhd-tool
: 0.43.0-20.1.xcpng8.2wsproxy
: 1.12.0-21.xcpng8.2xapi
: 1.249.38-1.11.xcpng8.2xapi-nbd
: 1.11.0-19.1.xcpng8.2xapi-storage
: 11.19.0_sxm2-19.xcpng8.2xapi-storage-script
: 0.34.1-18.1.xcpng8.2xcp-networkd
: 0.56.2-17.xcpng8.2xcp-rrdd
: 1.33.4-6.1.xcpng8.2xenopsd
: 0.150.19-5.1.xcpng8.2xenserver-status-report
: 1.3.16-3.xcpng8.2xcp-ng-xapi-plugins
: 1.10.1-1.xcpng8.2xs-opam-repo
: 6.35.13-4.xcpng8.2xs-openssl
: 1.1.1k-12.3.xcpng8.2xsconsole
: 10.1.13.1-2.1.xcpng8.2zstd
: 1.5.5-1.el7
Optional packages:
kernel-alt
: 4.19.265-2.xcpng8.2- Alternates drivers:
intel-i40e-alt
: 2.22.20-5.1.xcpng8.2mellanox-mlnxen-alt
: 5.9_0.5.5.0-1.2.xcpng8.2
New optional package:
mlx4-modules-alt
: 4.9_7.1.0.0-1.xcpng8.2
What to test
Normal use and anything else you want to test. The closer to your actual use of XCP-ng, the better.
Test window before official release of the updates
~1 week.
-
RE: XCP-ng 8.2 updates announcements and testing
The update is published. Thanks for your tests!
Blog post: https://xcp-ng.org/blog/2022/11/04/november-2022-security-update/ -
RE: RPM package vmfs6-tools missing for local migration procedure
Hello,
We've added a card to our backlog to investigate this topic.
-
RE: XCP-ng 8.3 updates announcements and testing
Update published: https://xcp-ng.org/blog/2025/01/23/january-2025-maintenance-update-for-xcp-ng-8-3/
Thank you for the tests!
-
RE: XCP-ng 8.3 updates announcements and testing
New update candidates for you to test!
A new batch of non-urgent updates is ready for user tests before a future collective release. Below are the details about these.
amd-microcode
: Update AMD microcode to the 2024-11-21 drop- Updates firmware for families 17h and 19h CPUs. For the first time, AMD published updates for non-server CPUs. One can assume that they started supporting microcode update for these, contrarily to what they did in the past, and that these updates thus fix various bugs and vulnerabilities. This is only (sensible) speculation at the moment, though.
grub
: Backport VLAN networking support for UEFI PXE boot.iperf3
: Upgrade to version 3.9-13 from CentOS 7- Includes a security fix for CVE-2023-38403
kernel
: Backport of a fix to correct cooling fan rotation speed on some Lenovo servers. For more information, you can read this thread on the forum.kexec-tools
: Backport of a patch removing kernel_version(). Fixing a bug for kernel with a patchlevel greater than 255.netdata
: Fixed an issue that could occur when quickly uninstalling the package, right after an unfinished installation, and leave a service in an undetermined status.slang
: Fixed display and input issues in optional packagemc
.sm
: Contains a fix for leaf coalesce where the size of the leaf to coalesce was wrongly computed before deciding if it was a live coalesce or not, it resulted in some leaf having too much data to coalesce not successing the live coalesce and staying in this state indefinitely.xapi
:- Fixed a malfunction related to the absence of a certificate, which could cause a loop.
- Fixed and improved various points in IPv6, related to management, reboot and re-initialization.
xo-lite
: Update to version 0.6.0. For more details, you can consult the blog post on the latest release of Xen Orchestra.
Optional packages:
kernel-alt
: Backport of a fix to correct cooling fan rotation speed on some Lenovo servers. For more information, you can read this thread on the forum.socat
: Update the package to version1.7.4.1
which includes a fix for a buffer overflow and security fixes.traceroute
: Updated to version 2.1.5.- Alternate Drivers: Updated to newer versions.
broadcom-bnxt-en-alt
: From version 1.10.2_227.0.130.0 to 1.10.3_231.0.162.0intel-i40e-alt
: From version 2.22.20-3.1 to 2.26.8- More information about drivers and current versions is on the drivers page: (https://github.com/xcp-ng/xcp/wiki/Drivers).
Test on XCP-ng 8.3
From an up-to-date host:
yum clean metadata --enablerepo=xcp-ng-testing yum update --enablerepo=xcp-ng-testing reboot
The usual update rules apply: pool coordinator first, etc.
Versions
amd-microcode
: 20240503-1.1.xcpng8.3grub
: 2.06-4.0.2.1.xcpng8.3iperf3
: 3.9-13.xcpng8.3kernel
: 4.19.19-8.0.37.1.xcpng8.3kexec-tools
: 2.0.15-20.1.xcpng8.3netdata
: 1.44.3-1.2.xcpng8.3slang
: 2.3.2-11.xcpng8.3sm
: 3.2.3-1.13.xcpng8.3xapi
: 24.19.2-1.9.xcpng8.3xo-lite
: 0.6.0-1.xcpng8.3
Optional packages:
kernel-alt
: 4.19.322+1-1.xcpng8.3socat
: 1.7.4.1-6.xcpng8.3traceroute
: 2.1.5-2.xcpng8.3- Alternate drivers:
broadcom-bnxt-en-alt
: 1.10.3_231.0.162.0-1.xcpng8.3intel-i40e-alt
: 2.26.8-1.xcpng8.3
What to test
Normal use and anything else you want to test. The closer to your actual use of XCP-ng, the better.
Test window before official release of the updates
None defined, but early feedback is always better than late feedback, which is in turn better than no feedback
-
RE: XCP-ng 8.2 updates announcements and testing
New security update candidates (xen)
Xen is being updated to mitigate some vulnerabilities:
- XSA-326: Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored.
- XSA-419: Xenstore: Cooperating guests can create arbitrary numbers of nodes
- XSA-414: A malicious guest can cause xenstored to crash, resulting in the inability to create new guests or to change the configuration of running guests.
- XSA-415: Xenstore: Guests can create orphaned Xenstore nodes
- XSA-416: Xenstore: Guests can cause Xenstore to not free temporary memory
- XSA-417: Xenstore: Guests can get access to Xenstore nodes of deleted domains
- XSA-418: Xenstore: Guests can crash xenstored via exhausting the stack
- XSA-420: Oxenstored 32->31 bit integer truncation issues. A malicious or buggy guest can write a packet into the xenstore ring which causes 32-bit builds of oxenstored to busy loop.
- XSA-421: Xenstore: Guests can create arbitrary number of nodes via transactions
Test on XCP-ng 8.2
From an up to date host:
yum clean metadata --enablerepo=xcp-ng-testing yum update xen-dom0-libs xen-dom0-tools xen-hypervisor xen-libs xen-tools --enablerepo=xcp-ng-testing reboot
Versions:
- xen-*: 4.13.4-9.27.1.xcpng8.2
What to test
Normal use and anything else you want to test. The closer to your actual use of XCP-ng, the better.
Test window before official release of the updates
~2 days.
-
RE: XCP-ng 8.2 updates announcements and testing
The update is published. Thanks for your tests!
Blog post: https://xcp-ng.org/blog/2022/10/14/october-2022-security-update/
Latest posts made by gduperrey
-
RE: XCP-ng 8.3 updates announcements and testing
Updates published: https://xcp-ng.org/blog/2025/09/11/september-2025-security-update-for-xcp-ng-8-3-lts/
Thank you for the tests!
-
RE: XCP-ng 8.2 updates announcements and testing
Updates published: https://xcp-ng.org/blog/2025/09/11/september-2025-security-update-for-xcp-ng-8-2-lts/
Thank you for the tests!
-
RE: XCP-ng 8.2 updates announcements and testing
New security update candidates for you to test!
A new XSA (Xen Security Advisory) was published on the 9th of September, and an update to Xen addresses it.
xen-*
:- Fix XSA-472 — Potential risks include Denial of Service (DoS) impacting the whole host, information exposure, or escalation of privileges. There are several vulnerabilities associated with the way guest memory pages are handled and accessed in the Viridian code:
- NULL pointer dereference during reference TSC area update — This issue occurs when the system tries to update the reference TSC area but encounters a NULL pointer. (CVE-2025-27466)
- NULL pointer dereference when delivering synthetic timer messages — This happens if the code assumes the SIM page is already mapped when a synthetic timer message must be delivered. (CVE-2025-58142)
- Race condition in reference TSC page mapping — A guest system can trigger Xen to release a memory page while it is still referenced in the guest’s physical-to-machine (p2m) page tables. (CVE-2025-58143)
- Fix XSA-472 — Potential risks include Denial of Service (DoS) impacting the whole host, information exposure, or escalation of privileges. There are several vulnerabilities associated with the way guest memory pages are handled and accessed in the Viridian code:
Test on XCP-ng 8.2
yum clean metadata --enablerepo=xcp-ng-candidates yum update --enablerepo=xcp-ng-candidates reboot
The usual update rules apply: pool coordinator first, etc.
Versions:
xen
: 4.13.5-9.49.4.xcpng8.2
What to test
- Normal use and anything else you want to test.
Test window before official release of the updates
~2 days.
Remarks
Another XSA (474) was released the same day regarding XAPI. Since the attack vector differs and is not easily exploitable in 8.2, we have not released a patch for it, unlike in 8.3.
As a reminder, XCP-ng 8.2 LTS will no longer be supported as of September 16, 2025.
We therefore strongly encourage you to migrate your pools to XCP-ng 8.3 LTS to continue benefiting from the latest security fixes and improvements.
-
RE: XCP-ng 8.3 updates announcements and testing
New security update candidates for you to test!
News XSAs (Xen Security Advisory) were published on the 9th of September, and updates to Xen & XAPI address them.
-
xapi
:- Fix XSA-474 — A Denial of Service can be caused by buggy or malicious inputs to XAPI (CVE-2025-58146). There are several vulnerabilities identified in XAPI:
- Input sanitisation mismatch in notifications — While updates to the XAPI database correctly sanitise input strings, the system generates notifications using the unsanitised version. This flaw causes the database’s event thread to crash, halting further processing.
- Inconsistent UTF-8 handling — XAPI’s UTF-8 encoder follows version 3.0 of the Unicode specification, whereas some of the libraries it relies on enforce the stricter version 3.1 standard. As a result, certain strings may be accepted as valid UTF-8 by XAPI but rejected by other components. If such strings are entered into the database, the database can subsequently fail to load.
- Lack of sanitisation in Map/Set updates — When updating Map/Set objects in the XAPI database, no sanitisation is applied to the inputs, which introduces additional risks.
- Fix XSA-474 — A Denial of Service can be caused by buggy or malicious inputs to XAPI (CVE-2025-58146). There are several vulnerabilities identified in XAPI:
-
xen-*
:- Fix XSA-472 — Potential risks include Denial of Service (DoS) impacting the whole host, information exposure, or escalation of privileges. There are several vulnerabilities associated with the way guest memory pages are handled and accessed in the Viridian code:
- NULL pointer dereference during reference TSC area update — This issue occurs when the system tries to update the reference TSC area but encounters a NULL pointer. (CVE-2025-27466)
- NULL pointer dereference when delivering synthetic timer messages — This happens if the code assumes the SIM page is already mapped when a synthetic timer message must be delivered. (CVE-2025-58142)
- Race condition in reference TSC page mapping — A guest system can trigger Xen to release a memory page while it is still referenced in the guest’s physical-to-machine (p2m) page tables. (CVE-2025-58143)
- Fix XSA-472 — Potential risks include Denial of Service (DoS) impacting the whole host, information exposure, or escalation of privileges. There are several vulnerabilities associated with the way guest memory pages are handled and accessed in the Viridian code:
Test on XCP-ng 8.3
yum clean metadata --enablerepo=xcp-ng-candidates yum update --enablerepo=xcp-ng-candidates reboot
The usual update rules apply: pool coordinator first, etc.
Versions:
xapi
: 25.6.0-1.12.xcpng8.3xen
: 4.17.5-15.3.xcpng8.3
What to test
Normal use and anything else you want to test.
Test window before official release of the updates
~2 days.
-
-
RE: XCP-ng 8.3 updates announcements and testing
Updates published: https://xcp-ng.org/blog/2025/09/01/september-2025-maintenance-update-for-xcp-ng-8-3/
Thank you for the tests!
-
RE: XCP-ng 8.3 updates announcements and testing
New update candidate for you to test!
A new non-urgent update is ready for user testing before a future collective release. Below are the details.
Maintenance updates
broadcom-bnxt-en
: Update driver to version 1.10.3_232.0.155.5
Test on XCP-ng 8.3
yum clean metadata --enablerepo=xcp-ng-testing yum update --enablerepo=xcp-ng-testing reboot
A reboot is preferable to load the new version of the driver.
The usual update rules apply: pool coordinator first, etc.
Versions:
broadcom-bnxt-en
: 1.10.3_232.0.155.5-1.xcpng8.3
What to test
Normal use and anything else you want to test.
Test window before official release of the updates
None defined, but early feedback is always better than late feedback, which is in turn better than no feedback
-
RE: XCP-ng 8.3 updates announcements and testing
New update candidate for you to test!
A new non-urgent update is ready for user testing before a future collective release. Below are the details.
A bug was found in the Emergency Network Reset due to desynchronisation between
xsconsole
and XAPI. This issue prevented the Emergency Network Reset from working at all. This update includes the fixes from the upstreamxsconsole
project to fix it.
Maintenance updates
xsconsole
- Backport sync of network reset trigger file path with XAPI to fix emergency network reset
- Backport fix for pool.conf IPv6 to avoid IPv6 truncation
Test on XCP-ng 8.3
yum clean metadata --enablerepo=xcp-ng-testing yum update --enablerepo=xcp-ng-testing reboot
Reboot is not strictly necessary, but the
xsconsole
instance running on the first virtual terminal of your host won't be restarted otherwise. If you do not reboot, make sure to startxsconsole
from another terminal after the update.The usual update rules apply: pool coordinator first, etc.
Versions:
xsconsole
: 11.0.8-1.2.xcpng8.3
What to test
Normal xsconsole usage, is still useful feedback. However, if possible, the most helpful test would be performing an Emergency Network Reset through
xsconsole
, making actual configuration changes and verifying that they are correctly applied after reboot.Test window before official release of the updates
None defined, but early feedback is always better than late feedback, which is in turn better than no feedback
-
RE: Epyc VM to VM networking slow
The fix, which was proposed as a test to resolve some of the issues encountered, has been integrated into an official update candidate which will be released to everyone next time we publish updates. For more information on this update, you can consult the following post: https://xcp-ng.org/forum/post/96135
-
RE: XCP-ng 8.3 updates announcements and testing
New update candidates for you to test!
A new batch of non-urgent updates is ready for user tests before a future collective release. Below are the details about these.
Maintenance updates
blktap
: Fix a bad integer conversion that interrupts valid coalesce calls on large VDIs. This fixes an error that could occur on VHD coalesces, generating logs on the SMAPI side.kernel
:- Fix compatibility issues with Minisforum MS-A2 machines. For more information, you can consult this forum post.
- Backport fix for CVE-2020-28374, a vulnerability that is unlikely to be exploitable in XCP-ng, fixed as defence-in-depth.
xapi
&xen
:- Add a new
/etc/xenopsd.conf.d
directory, in which users can add a.conf
file with configuration values for xenopsd. - Patch Xen to support a new option allowing to activate the remapping of grant-tables as Writeback. This fixes a performance issue for Linux Guests on AMD processors. Guests need their kernel to support the feature which enables this fix (Linux distributions that have recent enough kernels or apply fixes from the mainline LTS kernels are OK. Older ones are not. Some currently supported LTS distros don't have the patch yet: RHEL 8 and 9 and their derivatives are not ready yet - no effect on older distros such as Ubuntu 20.04. See partial list below). Windows and *BSD guests were not affected by the performance problem this change solves.
- While we are confident with this change, we decided to make it opt-in at first, so that users be conscious of the change and also know how to revert it if any side effects remain in edge cases. To enable the fix pool-wide, create a file named
/etc/xenopsd.conf.d/custom.conf
with the following line:xen-platform-pci-bar-uc=false
- Then restart the toolstack on the host:
xe-toolstack-restart
- Then add the configuration and restart the toolstack on every other hosts of the pool
- Then stop and start VMs so that the setting is applied to them at boot.
- Then restart the toolstack on the host:
- In a future update, this will become the default.
- This is not the end of the way towards better performance on AMD EPYC servers, but it's significant progress!
- Add a new
xo-lite
:- [Host/VM/Dashboard] Fix display error due to inversion of upload and download
- [Sidebar] Updated sidebar to auto close when the screen is small
- [SearchBar] Updated query search bar to work in responsive (PR #8761)
- [Pool,Host/Dashboard] CPU provisioning considers all VMs instead of just running VMs
- For more details, we invite you to read the blog post about the latest Xen-Orchestra update.
OS support for the AMD performance workaround:
- Debian: 11 (5.10: TODO), 12 (6.1: OK)
- Ubuntu: 20.04 LTS (5.4: EOL), 22.04 LTS (5.15: SOON, HWE 6.8: OK), 24.04 LTS (6.8 & HWE 6.14: OK)
- openSUSE Leap, 15.5 (5.14: EOL) 15.6 (6.4: OK)
- SUSE Enterprise (LTSS) : SLE15 SP3 - LTSS (5.3: Not upstream), SLE15 SP4/5 - LTSS (5.14: Not upstream), SLE15 SP6+ (OK)
- RHEL (+derivates): 8 (4.19: EOL-ish?), 9 (5.14: Not upstream), 10 (6.12: OK)
- Fedora: All supported: OK (37+)
- Alpine Linux: All supported: OK (v3.18+)
- EOL = distro is EOL
- Not upstream = not covered by Linux stable project (i.e probably needs discussions with distro)
- SOON: Distro needs to update its kernel
Test on XCP-ng 8.3
yum clean metadata --enablerepo=xcp-ng-testing yum update --enablerepo=xcp-ng-testing reboot
The usual update rules apply: pool coordinator first, etc.
Versions:
blktap
: 3.55.5-2.3.xcpng8.3kernel
: 4.19.19-8.0.38.4.xcpng8.3xapi
: 25.6.0-1.11.xcpng8.3xen
: 4.17.5-15.2.xcpng8.3xo-lite
: 0.13.1-1.xcpng8.3
What to test
Normal use and anything else you want to test.
Test window before official release of the updates
None defined, but early feedback is always better than late feedback, which is in turn better than no feedback
-
RE: RPM package vmfs6-tools missing for local migration procedure
Hello,
We've added a card to our backlog to investigate this topic.