XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Home
    2. Popular
    Log in to post
    • All Time
    • Day
    • Week
    • Month
    • All Topics
    • New Topics
    • Watched Topics
    • Unreplied Topics

    • All categories
    • johnnezeroJ

      Tag-Based Automation: Manage VM CPU Priority via assigned tag.

      Watching Ignoring Scheduled Pinned Locked Moved Management
      22
      0 Votes
      22 Posts
      254 Views
      tjkreidlT
      @john.c Not found with the Wayback Machine, alas. Still not finding it anywhere else, but will keep looking! It's a crying shame Citrix didn't preserve the treasure trove of old community blogs.
    • LoTus111L

      Slow Backups | XOA Performance Test – Upgrading from 2 vCPU to 4 vCPU / 8GB RAM

      Watching Ignoring Scheduled Pinned Locked Moved Backup backup xoa performance
      4
      0 Votes
      4 Posts
      27 Views
      LoTus111L
      @Pilow Thanks will look into this. MEM was somhow never realy at high peak during all the tasks. But off course is allocating more MEM when it is not used semi optimal
    • acebmxerA

      Some dashboard loading issues with v6

      Watching Ignoring Scheduled Pinned Locked Moved Xen Orchestra
      2
      5
      0 Votes
      2 Posts
      41 Views
      olivierlambertO
      Ping @Team-XO-Frontend
    • T

      V2V Migration | Mixed Volumes VHD and QCOW

      Watching Ignoring Scheduled Pinned Locked Moved Migrate to XCP-ng
      2
      1
      0 Votes
      2 Posts
      41 Views
      olivierlambertO
      Hi, Let me ping @Team-Storage
    • rvreugdeR

      XOA vulnerabilty to "copy fail" and "dirty frag" bug

      Watching Ignoring Scheduled Pinned Locked Moved XCP-ng
      7
      0 Votes
      7 Posts
      306 Views
      R
      I want to correct something I said in my earlier post, now that I've done a deeper analysis of the exploit chain. I described the RxRPC component as being responsible for heap memory grooming, and suggested that without it a sophisticated attacker would need to find an alternative grooming technique. That framing was inaccurate, and I don't want it to create false reassurance in the community. Here is what's actually going on: RxRPC (CVE-2026-43500) was not added to the exploit chain to groom memory. It was added specifically to bypass Ubuntu's AppArmor policy, which blocks unprivileged user namespace creation by default. On Ubuntu, the ESP4 path requires unshare() to create a user namespace, and AppArmor prevents that — so the RxRPC path provides an alternative write primitive that doesn't need a namespace at all. XCP-ng dom0 has no AppArmor. It is built on a CentOS 7 base where unprivileged user namespace creation is permitted by default. This means the ESP4 path (CVE-2026-43284) works directly, without any namespace restriction to bypass and without needing RxRPC at all. The practical consequence: every supported XCP-ng installation (8.1, 8.2, 8.3) is fully exploitable via CVE-2026-43284 alone. The absence of rxrpc.ko does not provide protection on this platform. The older OS base actually makes the ESP4 path more straightforward to reach, not less. I'm holding off publishing my diagnostic tool to give the VATES team time to finalise their VSA and patches for XCP-ng. In the meantime, the interim mitigation stands as I described — with @semarie's important caveat: blacklisting esp4/esp6 will break IPsec and the SDN controller's encrypted private tunnels. Check your environment before applying it. And as I noted in my follow-up: this remains an LPE. If you have no unprivileged service accounts on dom0 (no Terraform, no monitoring agents, no central logging), your exposure is already limited. Audit what has shell access to dom0 and remove anything that doesn't strictly need it.