XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    XCP-ng 8.3 updates announcements and testing

    Scheduled Pinned Locked Moved News
    419 Posts 47 Posters 161.9k Views 60 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R Offline
      robertblissitt @gduperrey
      last edited by

      @gduperrey Absolutely understand. 🙂 I didn't now about the Escape key as Manilx mentioned. Next time, I will press Esc to see if there is any useful information and report it here. This was just new behavior and wanted to report it informally.

      1 Reply Last reply Reply Quote 1
      • A Offline
        abudef
        last edited by abudef

        In my case, I gave the command to shut down all hosts, and the master "made it" first. The other hosts then got "stuck" at this point for a very long time:

        ad65b000-f778-4ce2-aba2-0ea120457691-image.jpeg

        EDIT: Apparently waiting for umount:

        2154dd7d-a1a4-4e82-a834-de4cd149041c-image.jpeg

        gduperreyG 1 Reply Last reply Reply Quote 1
        • gduperreyG Offline
          gduperrey Vates 🪐 XCP-ng Team @abudef
          last edited by

          @abudef In case of a shutdown, I turn off the secondary servers first. Once they are off, I shut down the primary server. This ensures that if the secondary servers have information to send to the primary, they can do so, whereas otherwise, they can wait to shut down.

          In case of a pool reboot, I reboot the primary server first, and once it is accessible, I reboot the secondary servers.

          A 1 Reply Last reply Reply Quote 1
          • A Offline
            abudef @gduperrey
            last edited by

            @gduperrey Of course, the order matters. Now everything seems to be clear.

            1 Reply Last reply Reply Quote 1
            • gduperreyG Offline
              gduperrey Vates 🪐 XCP-ng Team
              last edited by gduperrey

              New security and maintenance update candidate for you to test!

              A new security vulnerability, XSA-480, has been detected and fixed for xen.


              Security updates

              • xen: A vulnerability has been discovered on x86 Intel systems with EPT support, where unintended host or guest memory regions can be accessed from a VM's memory cache under any workload. This can lead to privilege escalation, denial of service (DoS) attacks affecting the entire host, or information leaks.
                On XCP-ng 8.3, x86 HVM/PVH VMs can leverage this vulnerability.
                There are no mitigations.

              A VSA was also published by our security team: https://docs.vates.tech/security/advisories/2026/vates-sa-2026-005/

              Maintenance updates

              We are taking this opportunity to release an update for ipmitool following some feedback from our users regarding the display of an error message in Xen-Orchestra, with certain models of DELL servers, in relation to the command ipmitool lan print.

              Test on XCP-ng 8.3

              yum clean metadata --enablerepo=xcp-ng-testing,xcp-ng-candidates
              yum update --enablerepo=xcp-ng-testing,xcp-ng-candidates
              reboot
              

              The usual update rules apply: pool coordinator first, etc.

              Versions:

              • ipmitool: 1.8.19-11.2.xcpng8.3
              • xen: 4.17.6-5.1.xcpng8.3

              What to test

              Normal use and anything else you want to test.

              Test window before official release of the updates

              ~2 days

              F 1 Reply Last reply Reply Quote 3
              • F Offline
                flakpyro @gduperrey
                last edited by

                @gduperrey No issues to report on my test systems.

                1 Reply Last reply Reply Quote 3
                • gduperreyG Offline
                  gduperrey Vates 🪐 XCP-ng Team
                  last edited by

                  Thank you everyone for your tests and your feedback!

                  The updates are live now: https://xcp-ng.org/blog/2026/03/19/march-2026-security-updates-for-xcp-ng-8-3-lts/

                  M 1 Reply Last reply Reply Quote 2
                  • M Offline
                    manilx @gduperrey
                    last edited by

                    @gduperrey reboot necessary?

                    stormiS 1 Reply Last reply Reply Quote 0
                    • stormiS Offline
                      stormi Vates 🪐 XCP-ng Team @manilx
                      last edited by

                      @manilx Yes, as written 🙂

                      M 1 Reply Last reply Reply Quote 0
                      • M Offline
                        manilx @stormi
                        last edited by

                        @stormi didn't see that (my old eyes)... guessed so anyway 😉

                        1 Reply Last reply Reply Quote 0

                        Hello! It looks like you're interested in this conversation, but you don't have an account yet.

                        Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.

                        With your input, this post could be even better 💗

                        Register Login
                        • First post
                          Last post