-
New update candidates for you to test!
As you may know, we group non-urgent updates together for a collective release, in order not to cause unnecessary maintenance for our users.
The moment to release such a batch has come, so here they are, ready for user tests before the final release.
XAPI
:- Synced with XS82ECU1074
- Enhancement: robustification of the command
xe host-emergency-ha-disable
- Correction of different issues:
- Performing a hard shutdown of a VM may hang due to unnecessary RBCA permission checks. An icon (yellow triangle) may then be displayed on some management applications, indicating that the shutdown process did not complete successfully.
- Canceling a hard shutdown of a hung VM fails because the cancel function only checks for proper shutdowns.
- Migrating VMs from 8.2.1 to 8.3 with the
xe vm-migrate
command may fail with the error 'Failure: Unknown tag/contents'. - You may encounter a 500 error (internal server error) when trying to retrieve RRD measurements from a powered off virtual machine.
- Enhancement: robustification of the command
- Synced with XS82ECU1074
xsconsole
:- Synced with XS82ECU1074: Fix for a time-out when creating an iSCSI SR.
guest-templates-json
:- Add generic templates for Linux BIOS and UEFI
- Synced with XS82ECU1085:
- Oracle 8 requires minimum 2 vCPUS.
- Added template for Ubuntu 24.04
sm
:- Synced with XS82ECU1075
- Updated multipath.conf for several SANs
- Fix for CA-393194: Find the real PV in a VG before removing the VG.
- Synced with XS82ECU1075
blktap
: Synced with XS82ECU1075: Improvements on coalesce performance.curl
: Backport fixes for several CVE: CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-7264openssl
: Update to version 1.0.2k-26 from CentOS 7 updates and backports of available CVE fixes from openssl upstream. Update from CentOS 7 Includes fixes for CVE-2021-3712, CVE-2022-2078 and CVE-2023-0286. Backport are fixing CVE-2019-1547, CVE-2019-1551 and CVE-2019-1563.xs-openssl
: Rebased on version 1.1.1k-12 from CentOS 8 Stream. Include fixes for CVE-2023-5678, CVE-2023-3446, CVE-2023-3817 and a proper fix for CVE-2020-25659.zstd
: Update to version 1.5.5 to avoid an extremely rare cases of corruptionxcp-ng-xapi-plugins
: Enhance error reporting when a command run on a host fails.xenserver-status-report
: Update to latest version, synced with XS82ECU1058python-defusedxml
: Added as a new dependency ofxenserver-status-report
.- Alternate Drivers: Updated to newer versions.
intel-i40e-alt
: From version 2.22.20-3.1 to 2.22.20-5.1mellanox-mlnxen-alt
: From version 5.9.0.5.5.0-1.1 to 5.9.0.5.5.0-1.2- More information about drivers and current versions is on the drivers page: (https://github.com/xcp-ng/xcp/wiki/Drivers).
- New alternate driver
mlx4-modules-alt
: To resolve some issues with CX3 cards and SR-IOV, we added an updated version 4.9-7.1.0.0-LTS of this driver. - kernel-alt: Backport of a fix to correct cooling fan rotation speed on some Lenovo servers. For more information, you can read this thread on the forum.
As a dependency of XOSTOR:
http-nbd-transfer
:- Try to open device and start HTTP server before notifying the user
- Install pyc and pyo files
Test on XCP-ng 8.2
From an up to date host:
yum clean metadata --enablerepo=xcp-ng-testing,xcp-ng-candidates yum update --enablerepo=xcp-ng-testing,xcp-ng-candidates reboot
The usual update rules apply: pool coordinator first, etc.
Versions
blktap
: 3.37.4-4.1.xcpng8.2curl
: 8.6.0-2.2.xcpng8.2forkexecd
: 1.18.3-12.1.xcpng8.2gpumon
: 0.18.0-20.1.xcpng8.2guest-templates-json
: 1.10.7-1.2.xcpng8.2http-nbd-transfer
: 1.4.0-1.xcpng8.2message-switch
: 1.23.2-19.1.xcpng8.2ocaml-rrd-transport
: 1.16.1-17.1.xcpng8.2ocaml-rrdd-plugin
: 1.9.1-17.1.xcpng8.2ocaml-tapctl
: 1.5.1-17.1.xcpng8.2ocaml-xcp-idl
: 1.96.7-6.1.xcpng8.2ocaml-xen-api-client
: 1.9.0-20.1.xcpng8.2ocaml-xen-api-libs-transitional
: 2.25.7-1.1.xcpng8.2openssl
: 1.0.2k-26.2.xcpng8.2python-defusedxml
: 0.7.1-1.xcpng8.2rrd2csv
: 1.2.6-17.1.xcpng8.2rrdd-plugins
: 1.10.9-14.1.xcpng8.2sm
: 2.30.8-13.1.xcpng8.2sm-cli
: 0.23.0-63.1.xcpng8.2squeezed
: 0.27.0-20.1.xcpng8.2varstored-guard
: 0.6.2-17.xcpng8.2vhd-tool
: 0.43.0-20.1.xcpng8.2wsproxy
: 1.12.0-21.xcpng8.2xapi
: 1.249.38-1.11.xcpng8.2xapi-nbd
: 1.11.0-19.1.xcpng8.2xapi-storage
: 11.19.0_sxm2-19.xcpng8.2xapi-storage-script
: 0.34.1-18.1.xcpng8.2xcp-networkd
: 0.56.2-17.xcpng8.2xcp-rrdd
: 1.33.4-6.1.xcpng8.2xenopsd
: 0.150.19-5.1.xcpng8.2xenserver-status-report
: 1.3.16-3.xcpng8.2xcp-ng-xapi-plugins
: 1.10.1-1.xcpng8.2xs-opam-repo
: 6.35.13-4.xcpng8.2xs-openssl
: 1.1.1k-12.3.xcpng8.2xsconsole
: 10.1.13.1-2.1.xcpng8.2zstd
: 1.5.5-1.el7
Optional packages:
kernel-alt
: 4.19.265-2.xcpng8.2- Alternates drivers:
intel-i40e-alt
: 2.22.20-5.1.xcpng8.2mellanox-mlnxen-alt
: 5.9_0.5.5.0-1.2.xcpng8.2
New optional package:
mlx4-modules-alt
: 4.9_7.1.0.0-1.xcpng8.2
What to test
Normal use and anything else you want to test. The closer to your actual use of XCP-ng, the better.
Test window before official release of the updates
~1 week.
-
Updated my machine at home, no issue so far.
-
The same
-
This seems to be working well for me too.
-
@gduperrey Single 8.2.1 hosts and pools updated. All running fine. VMs working, CR CBT/NBD backup working.
-
New security update candidates for XCP-ng 8.2 LTS (xen, microcode_ctl)
Two new XSAs were published on November 12th 2024.
Intel published a microcode update on the November 12th 2024.NOTE: This was published soon after the previous testing updates, therefore, we did not publish the previous and everything will be published altogether.
- XSA-463 an unprivileged guest making two quick accesses to the VGA memory can deadlock a host.
- XSA-464 an unprivileged PVH guest may access sensitive information from the host, control domain or other guests.
SECURITY UPDATES
xen-*
:- Fix XSA-463 - Deadlock in x86 HVM standard VGA handling. A mistake in the locking of process of the "standard" VGA memory makes it possible for a guest to make 2 quick accesses and create a deadlock that will hang the host.
- Fix XSA-464 - libxl leaks data to PVH guests via ACPI tables. The ACPI tables for PVH guests initialization left the excess memory space with its previous content, which was then copied to the guest memory as it was, resulting in possible leak of sensitive information. This doesn't affect XCP-ng in its normal configuration, as only HVM and PV-in-PVH (not affected) guests are supported.
microcode_ctl
:- Latest Intel microcode update, published on November the 12th:
- Security updates for INTEL-SA-01101
- Security updates for INTEL-SA-01079
- Updated security updates for INTEL-SA-01097
- Updated security updates for INTEL-SA-01103
- Multiple other updates for functional issues.
- Latest Intel microcode update, published on November the 12th:
Test on XCP-ng 8.2
Install all the current update candidates: the ones we already made users test to prepare for the next train of updates, and the new ones which fix security vulnerabilities. We will release them all together.
yum clean metadata --enablerepo=xcp-ng-candidates,xcp-ng-testing yum update --enablerepo=xcp-ng-candidates,xcp-ng-testing reboot
The usual update rules apply: pool coordinator first, etc.
Versions:
Security updates:
xen
: 4.13.5-9.45.1.xcpng8.2microcode_ctl
: 2.1-26.xs29.6.xcpng8.2
The rest of the packages is described in the previous update candidate announcement.
What to test
Normal use and anything else you want to test.
Test window before official release of the update
~ 2 days because of security updates.
-
We also need you to test updates for XCP-ng 8.3. I created a new thread dedicated to XCP-ng 8.3, and renamed this present thread to make it dedicated to XCP-ng 8.2.
Please ensure you follow the new thread if you plan to help on testing XCP-ng 8.3.
New thread: https://xcp-ng.org/forum/topic/9964/xcp-ng-8-3-updates-announcements-and-testing
-
@gduperrey Installed and running on active pools.
-
Tested internally here, working as expected
-
Seems to be working well on my test servers.
-
We have identified an issue related to Xostor and HA management in the
http-nbd-transfer-1.4.0-1.xcpng8.2
package. We therefore prefer to remove it from these updates while waiting for a future corrected version.For those who have tested these updates and who have Xostor on their test pool, we invite you to downgrade this package to version 1.3.0 with the following command:
yum downgrade http-nbd-transfer
-
@gduperrey, that doesn't seem to work for me. I receive an error from yum:
No Match for available package: http-nbd-transfer-1.3.0-1.xcpng8.2.x86_64
Nothing to do -
@JeffBerntsen Do you have XOSTOR on the pool?
-
Update published: https://xcp-ng.org/blog/2024/11/15/november-2024-security-and-maintenance-update-for-xcp-ng-8-2-lts/
Thank you for the tests!
-
@stormi said in XCP-ng 8.2 updates announcements and testing:
@JeffBerntsen Do you have XOSTOR on the pool?
Not yet, but was planning to add it to this test pool so thought I should downgrade beforehand. Does that particular patch only apply to systems with XOSTOR already installed?
-
This package is installed by Xostor. If you have not installed it yet, it is not present on the system and has not been updated.
The right package, in the right version, will be installed when you will install Xostor to test it. -
@gduperrey, I suspected that was the case after seeing that message but wanted to make sure. Thanks!
-
New update candidates for you to test!
A new batch of non-urgent updates is ready for user tests before a future collective release. Below are the details about these.
iperf3
: Upgrade to version 3.9-13 from CentOS 7- Includes a security fix for CVE-2023-38403
kernel
: Backport of a fix to correct cooling fan rotation speed on some Lenovo servers. For more information, you can read this thread on the forum.linux-firmware
: Update AMD microcode to the 2024-11-21 drop- Updates firmware for families 17h and 19h CPUs
netdata
: Fixed an issue that could occur when quickly uninstalling the package, right after an unfinished installation, and leave a service in an undetermined status.openssh
:- Synchronized with hotfix XS82ECU1072 from Citrix.
- Security fix for CVE-2024-6387
socat
: Update the package to version1.7.4.1
which includes a fix for a buffer overflow and security fixes.sudo
: Synchronized with hotfix XS82ECU1072 from Citrix.intel-igc
: This driver replacesigc-module
to maintain consistency with the change made in this direction in 8.3.
vendor-drivers
: Updated to pullintel-igc
instead ofigc-module
, following the package renaming.xcp-ng-deps
: Addedvim-minimal
as a dependency, so it is always present on XCP-ng systems.xcp-ng-release
:- Synchronized with hotfix XS82ECU1072 from Citrix.
- Upstream changelog: "Start dhclient on iSCSI BFS interfaces".
xenserver-status-report
:- Synchronized with hotfix XS82ECU1072 from Citrix.
- Update from version
1.3.16-3
to1.3.17
Optional packages:
- Alternate Driver: Updated to newer version.
broadcom-bnxt-en-alt
: From version 1.10.2_227.0.130.0 to 1.10.3_231.0.162.0- More information about drivers and current versions is on the drivers page: (https://github.com/xcp-ng/xcp/wiki/Drivers).
Test on XCP-ng 8.2
From an up to date host:
yum clean metadata --enablerepo=xcp-ng-testing yum update --enablerepo=xcp-ng-testing reboot
The usual update rules apply: pool coordinator first, etc.
Versions
intel-igc
: 5.10.214-3.1.xcpng8.2iperf3
: 3.9-13.xcpng8.2kernel
: 4.19.19-7.0.23.2.xcpng8.2linux-firmware
: 20190314-11.2.xcpng8.2netdata
: 1.19.0-6.xcpng8.2openssh
: 7.4p1-23.3.1.xcpng8.2socat
: 1.7.4.1-6.xcpng8.2sudo
: 1.9.15-4.1.xcpng8.2vendor-drivers
: 1.0.2-1.7.xcpng8.2xcp-ng-deps
: 8.2.0-13xcp-ng-release
: 8.2.1-14xenserver-status-report
: 1.3.17-1.xcpng8.2
Optional packages:
- Alternate drivers:
broadcom-bnxt-en-alt
: 1.10.3_231.0.162.0-1.xcpng8.2
What to test
Normal use and anything else you want to test. The closer to your actual use of XCP-ng, the better.
Test window before official release of the updates
None defined, but early feedback is always better than late feedback, which is in turn better than no feedback
-
Installed and seems to be working well on my test systems.
-
@gduperrey Updates installed and working on busy hosts/pools.