XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    XCP-ng 8.3 updates announcements and testing

    Scheduled Pinned Locked Moved News
    437 Posts 47 Posters 178.1k Views 61 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A Offline
      abudef
      last edited by abudef

      In my case, I gave the command to shut down all hosts, and the master "made it" first. The other hosts then got "stuck" at this point for a very long time:

      ad65b000-f778-4ce2-aba2-0ea120457691-image.jpeg

      EDIT: Apparently waiting for umount:

      2154dd7d-a1a4-4e82-a834-de4cd149041c-image.jpeg

      gduperreyG 1 Reply Last reply Reply Quote 1
      • gduperreyG Offline
        gduperrey Vates 🪐 XCP-ng Team @abudef
        last edited by

        @abudef In case of a shutdown, I turn off the secondary servers first. Once they are off, I shut down the primary server. This ensures that if the secondary servers have information to send to the primary, they can do so, whereas otherwise, they can wait to shut down.

        In case of a pool reboot, I reboot the primary server first, and once it is accessible, I reboot the secondary servers.

        A 1 Reply Last reply Reply Quote 1
        • A Offline
          abudef @gduperrey
          last edited by

          @gduperrey Of course, the order matters. Now everything seems to be clear.

          1 Reply Last reply Reply Quote 1
          • gduperreyG Offline
            gduperrey Vates 🪐 XCP-ng Team
            last edited by gduperrey

            New security and maintenance update candidate for you to test!

            A new security vulnerability, XSA-480, has been detected and fixed for xen.


            Security updates

            • xen: A vulnerability has been discovered on x86 Intel systems with EPT support, where unintended host or guest memory regions can be accessed from a VM's memory cache under any workload. This can lead to privilege escalation, denial of service (DoS) attacks affecting the entire host, or information leaks.
              On XCP-ng 8.3, x86 HVM/PVH VMs can leverage this vulnerability.
              There are no mitigations.

            A VSA was also published by our security team: https://docs.vates.tech/security/advisories/2026/vates-sa-2026-005/

            Maintenance updates

            We are taking this opportunity to release an update for ipmitool following some feedback from our users regarding the display of an error message in Xen-Orchestra, with certain models of DELL servers, in relation to the command ipmitool lan print.

            Test on XCP-ng 8.3

            yum clean metadata --enablerepo=xcp-ng-testing,xcp-ng-candidates
            yum update --enablerepo=xcp-ng-testing,xcp-ng-candidates
            reboot
            

            The usual update rules apply: pool coordinator first, etc.

            Versions:

            • ipmitool: 1.8.19-11.2.xcpng8.3
            • xen: 4.17.6-5.1.xcpng8.3

            What to test

            Normal use and anything else you want to test.

            Test window before official release of the updates

            ~2 days

            F A 2 Replies Last reply Reply Quote 3
            • F Offline
              flakpyro @gduperrey
              last edited by

              @gduperrey No issues to report on my test systems.

              1 Reply Last reply Reply Quote 3
              • gduperreyG Offline
                gduperrey Vates 🪐 XCP-ng Team
                last edited by

                Thank you everyone for your tests and your feedback!

                The updates are live now: https://xcp-ng.org/blog/2026/03/19/march-2026-security-updates-for-xcp-ng-8-3-lts/

                M 1 Reply Last reply Reply Quote 2
                • M Offline
                  manilx @gduperrey
                  last edited by

                  @gduperrey reboot necessary?

                  stormiS 1 Reply Last reply Reply Quote 0
                  • stormiS Offline
                    stormi Vates 🪐 XCP-ng Team @manilx
                    last edited by

                    @manilx Yes, as written 🙂

                    M 1 Reply Last reply Reply Quote 0
                    • M Offline
                      manilx @stormi
                      last edited by

                      @stormi didn't see that (my old eyes)... guessed so anyway 😉

                      1 Reply Last reply Reply Quote 0
                      • A Offline
                        acebmxer @gduperrey
                        last edited by

                        @gduperrey

                        When applying updates at work. I started with first pool and choose the rolling pool updates and ran into issue after fist host came back up the second host didnt enter maintenance mode and the operation appeared to have just stopped. I then manually put host 2 in maintenance mode and applied updates. Once updates finished it restated the tool stack and took the host out of maintenance mode. I put it back into maintenance mode and rebooted the host. Once it came backup no migration occurred as expected to bring vms back to host2.

                        Moved on to pools 2 and 3 and just did everything manually. Each time load balance appears to be broken now just like home lab.

                        I have rebooted XOA deleted load balance config. rebuilt using different name and still no load balance.

                        Once manually migrated vms back over to second host in all three pools all seems ok.

                        gduperreyG 1 Reply Last reply Reply Quote 0
                        • gduperreyG Offline
                          gduperrey Vates 🪐 XCP-ng Team @acebmxer
                          last edited by

                          @acebmxer Hello,

                          What you're describing sounds more like an RPU issue with Xen-Orchestra than a problem related to XCP-ng updates. But I could be wrong 😉

                          However, since these updates affect Xen, a reboot was clearly indicated in our procedure. So a simple restart of the toolstack isn't enough. You did the right thing by rebooting afterward.

                          Are you using XO Appliance or from source?

                          If it's XO Appliance, you can open a ticket to ask for help analyzing the situation and see if anything in the logs or configuration explains this behavior.

                          If it's from source, for the same issue, I would suggest you start a separate thread on the forum so other users can help you with the analysis 🙂

                          In any case, it's great if your pool is working in the end 🙂

                          A 1 Reply Last reply Reply Quote 0
                          • A Offline
                            acebmxer @gduperrey
                            last edited by acebmxer

                            @gduperrey

                            Thank you for the reply. Work uses XOA.

                            Edit - Support ticket created - Ticket#7755004

                            gduperreyG 1 Reply Last reply Reply Quote 1
                            • gduperreyG Offline
                              gduperrey Vates 🪐 XCP-ng Team @acebmxer
                              last edited by

                              @acebmxer I invite you to open a ticket through the support ticketing system.

                              I do not connect remotely myself and I am also unable to provide support for Xen-Orchestra.

                              1 Reply Last reply Reply Quote 0
                              • gduperreyG Offline
                                gduperrey Vates 🪐 XCP-ng Team
                                last edited by

                                New security update candidate for you to test!

                                A new security vulnerability has been detected and fixed for xen.

                                This was introduced by an upstream commit, and detected before the Xen Project did any new release. Therefore this does not impact any upstream release, and there is no Xen Security Advisory this time. But that change was backported into XCP-ng xen package, therefore XCP-ng is impacted.


                                Security updates

                                • xen: Fix a security issue where insufficient memory sanitization during guest creation can lead to information leakage from previous guests and potential privilege escalation

                                Test on XCP-ng 8.3

                                yum clean metadata --enablerepo=xcp-ng-testing,xcp-ng-candidates
                                yum update --enablerepo=xcp-ng-testing,xcp-ng-candidates
                                reboot
                                

                                The usual update rules apply: pool coordinator first, etc.

                                Versions:

                                • xen: 4.17.6-5.2.xcpng8.3

                                What to test

                                Normal use and anything else you want to test.

                                Test window before official release of the updates

                                ~2 days

                                F P A J 4 Replies Last reply Reply Quote 0
                                • F Offline
                                  flakpyro @gduperrey
                                  last edited by

                                  @gduperrey Installed on my usual round test hosts. No issues to report so far! With such a small change i wasn't expecting anything to go wrong!

                                  1 Reply Last reply Reply Quote 4
                                  • P Offline
                                    ph7 @gduperrey
                                    last edited by

                                    @gduperrey
                                    All good so far

                                    1 Reply Last reply Reply Quote 3
                                    • A Offline
                                      Andrew Top contributor @gduperrey
                                      last edited by

                                      @gduperrey Up and working on several Intel pools.

                                      1 Reply Last reply Reply Quote 3
                                      • J Offline
                                        JeffBerntsen Top contributor @gduperrey
                                        last edited by

                                        @gduperrey Seems to be working well on my test systems.

                                        1 Reply Last reply Reply Quote 2
                                        • G Offline
                                          Greg_E
                                          last edited by

                                          How many of these are critical? I haven't even had time to apply the last round of patches to either lab or production. 😕

                                          1 Reply Last reply Reply Quote 0
                                          • gduperreyG Offline
                                            gduperrey Vates 🪐 XCP-ng Team
                                            last edited by

                                            Thank you everyone for your tests and your feedback!

                                            The updates are live now: https://xcp-ng.org/blog/2026/03/26/march-2026-security-updates-2-for-xcp-ng-8-3-lts/

                                            A 1 Reply Last reply Reply Quote 1

                                            Hello! It looks like you're interested in this conversation, but you don't have an account yet.

                                            Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.

                                            With your input, this post could be even better 💗

                                            Register Login
                                            • First post
                                              Last post