XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    XCP-ng 8.3 updates announcements and testing

    Scheduled Pinned Locked Moved News
    437 Posts 47 Posters 178.0k Views 61 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • gduperreyG Offline
      gduperrey Vates 🪐 XCP-ng Team
      last edited by gduperrey

      New security and maintenance update candidate for you to test!

      A new security vulnerability, XSA-480, has been detected and fixed for xen.


      Security updates

      • xen: A vulnerability has been discovered on x86 Intel systems with EPT support, where unintended host or guest memory regions can be accessed from a VM's memory cache under any workload. This can lead to privilege escalation, denial of service (DoS) attacks affecting the entire host, or information leaks.
        On XCP-ng 8.3, x86 HVM/PVH VMs can leverage this vulnerability.
        There are no mitigations.

      A VSA was also published by our security team: https://docs.vates.tech/security/advisories/2026/vates-sa-2026-005/

      Maintenance updates

      We are taking this opportunity to release an update for ipmitool following some feedback from our users regarding the display of an error message in Xen-Orchestra, with certain models of DELL servers, in relation to the command ipmitool lan print.

      Test on XCP-ng 8.3

      yum clean metadata --enablerepo=xcp-ng-testing,xcp-ng-candidates
      yum update --enablerepo=xcp-ng-testing,xcp-ng-candidates
      reboot
      

      The usual update rules apply: pool coordinator first, etc.

      Versions:

      • ipmitool: 1.8.19-11.2.xcpng8.3
      • xen: 4.17.6-5.1.xcpng8.3

      What to test

      Normal use and anything else you want to test.

      Test window before official release of the updates

      ~2 days

      F A 2 Replies Last reply Reply Quote 3
      • F Offline
        flakpyro @gduperrey
        last edited by

        @gduperrey No issues to report on my test systems.

        1 Reply Last reply Reply Quote 3
        • gduperreyG Offline
          gduperrey Vates 🪐 XCP-ng Team
          last edited by

          Thank you everyone for your tests and your feedback!

          The updates are live now: https://xcp-ng.org/blog/2026/03/19/march-2026-security-updates-for-xcp-ng-8-3-lts/

          M 1 Reply Last reply Reply Quote 2
          • M Offline
            manilx @gduperrey
            last edited by

            @gduperrey reboot necessary?

            stormiS 1 Reply Last reply Reply Quote 0
            • stormiS Offline
              stormi Vates 🪐 XCP-ng Team @manilx
              last edited by

              @manilx Yes, as written 🙂

              M 1 Reply Last reply Reply Quote 0
              • M Offline
                manilx @stormi
                last edited by

                @stormi didn't see that (my old eyes)... guessed so anyway 😉

                1 Reply Last reply Reply Quote 0
                • A Offline
                  acebmxer @gduperrey
                  last edited by

                  @gduperrey

                  When applying updates at work. I started with first pool and choose the rolling pool updates and ran into issue after fist host came back up the second host didnt enter maintenance mode and the operation appeared to have just stopped. I then manually put host 2 in maintenance mode and applied updates. Once updates finished it restated the tool stack and took the host out of maintenance mode. I put it back into maintenance mode and rebooted the host. Once it came backup no migration occurred as expected to bring vms back to host2.

                  Moved on to pools 2 and 3 and just did everything manually. Each time load balance appears to be broken now just like home lab.

                  I have rebooted XOA deleted load balance config. rebuilt using different name and still no load balance.

                  Once manually migrated vms back over to second host in all three pools all seems ok.

                  gduperreyG 1 Reply Last reply Reply Quote 0
                  • gduperreyG Offline
                    gduperrey Vates 🪐 XCP-ng Team @acebmxer
                    last edited by

                    @acebmxer Hello,

                    What you're describing sounds more like an RPU issue with Xen-Orchestra than a problem related to XCP-ng updates. But I could be wrong 😉

                    However, since these updates affect Xen, a reboot was clearly indicated in our procedure. So a simple restart of the toolstack isn't enough. You did the right thing by rebooting afterward.

                    Are you using XO Appliance or from source?

                    If it's XO Appliance, you can open a ticket to ask for help analyzing the situation and see if anything in the logs or configuration explains this behavior.

                    If it's from source, for the same issue, I would suggest you start a separate thread on the forum so other users can help you with the analysis 🙂

                    In any case, it's great if your pool is working in the end 🙂

                    A 1 Reply Last reply Reply Quote 0
                    • A Offline
                      acebmxer @gduperrey
                      last edited by acebmxer

                      @gduperrey

                      Thank you for the reply. Work uses XOA.

                      Edit - Support ticket created - Ticket#7755004

                      gduperreyG 1 Reply Last reply Reply Quote 1
                      • gduperreyG Offline
                        gduperrey Vates 🪐 XCP-ng Team @acebmxer
                        last edited by

                        @acebmxer I invite you to open a ticket through the support ticketing system.

                        I do not connect remotely myself and I am also unable to provide support for Xen-Orchestra.

                        1 Reply Last reply Reply Quote 0
                        • gduperreyG Offline
                          gduperrey Vates 🪐 XCP-ng Team
                          last edited by

                          New security update candidate for you to test!

                          A new security vulnerability has been detected and fixed for xen.

                          This was introduced by an upstream commit, and detected before the Xen Project did any new release. Therefore this does not impact any upstream release, and there is no Xen Security Advisory this time. But that change was backported into XCP-ng xen package, therefore XCP-ng is impacted.


                          Security updates

                          • xen: Fix a security issue where insufficient memory sanitization during guest creation can lead to information leakage from previous guests and potential privilege escalation

                          Test on XCP-ng 8.3

                          yum clean metadata --enablerepo=xcp-ng-testing,xcp-ng-candidates
                          yum update --enablerepo=xcp-ng-testing,xcp-ng-candidates
                          reboot
                          

                          The usual update rules apply: pool coordinator first, etc.

                          Versions:

                          • xen: 4.17.6-5.2.xcpng8.3

                          What to test

                          Normal use and anything else you want to test.

                          Test window before official release of the updates

                          ~2 days

                          F P A J 4 Replies Last reply Reply Quote 0
                          • F Offline
                            flakpyro @gduperrey
                            last edited by

                            @gduperrey Installed on my usual round test hosts. No issues to report so far! With such a small change i wasn't expecting anything to go wrong!

                            1 Reply Last reply Reply Quote 4
                            • P Offline
                              ph7 @gduperrey
                              last edited by

                              @gduperrey
                              All good so far

                              1 Reply Last reply Reply Quote 3
                              • A Offline
                                Andrew Top contributor @gduperrey
                                last edited by

                                @gduperrey Up and working on several Intel pools.

                                1 Reply Last reply Reply Quote 3
                                • J Offline
                                  JeffBerntsen Top contributor @gduperrey
                                  last edited by

                                  @gduperrey Seems to be working well on my test systems.

                                  1 Reply Last reply Reply Quote 2
                                  • G Offline
                                    Greg_E
                                    last edited by

                                    How many of these are critical? I haven't even had time to apply the last round of patches to either lab or production. 😕

                                    1 Reply Last reply Reply Quote 0
                                    • gduperreyG Offline
                                      gduperrey Vates 🪐 XCP-ng Team
                                      last edited by

                                      Thank you everyone for your tests and your feedback!

                                      The updates are live now: https://xcp-ng.org/blog/2026/03/26/march-2026-security-updates-2-for-xcp-ng-8-3-lts/

                                      A 1 Reply Last reply Reply Quote 1
                                      • A Offline
                                        acebmxer @gduperrey
                                        last edited by

                                        @gduperrey
                                        Installed on home lab via rolling pool update and both host updated no issues and vms migrated back to 2nd host as expected this time. fingers crossed work servers have the same luck.

                                        I do have open support ticket from last round of updates for work servers. Waiting for response before installing patches.

                                        1 Reply Last reply Reply Quote 1
                                        • stormiS stormi referenced this topic
                                        • rzrR Offline
                                          rzr Vates 🪐 XCP-ng Team
                                          last edited by

                                          New feature, security and maintenance update candidates for you to test!

                                          This release batch contains a major storage feature,
                                          read the RC2 announcement for QCOW2 image format support for 2TiB+ images.

                                          The whole platform has been hardened with a major OpenSSH update.

                                          The updated Windows Guest Tools bring support for the XSTDVGA driver, allowing display resizing.

                                          We also publish other non-urgent updates which we had in the pipe for the next update release.

                                          What changed

                                          Storage

                                          QCOW2 image format support is the major feature of this release batch,
                                          check related announcement in forum.

                                          • sm: 3.2.12-17.2
                                            • Add support for the QCOW2 image format
                                          • blktap: 3.55.5-6.4
                                            • Add support of new QCOW2 disk type

                                          Maintenance updates

                                          Virtualization & System

                                          • xen: 4.17.6-6.1
                                            • Sync with XenServer's xen-4.17.6-6.xs8
                                            • Fix boot failure on some UEFI systems.
                                          • kernel: 4.19.19-8.0.46.1
                                            • Fix regarding use of the correct MAC address in the rndis_host driver
                                            • Backport fix regarding a potential bug in the ext4 driver (CVE-2020-14314)
                                            • Backports fixes in SUNRPC (related to NFS). This prevents host crashes under some circumstances.

                                          Control plane

                                          • xapi: 26.1.3-1.6
                                            • Several fixes to QCOW2 enablement for importing and exporting, like reducing memory usage on disk import
                                          • xcp-ng-xapi-plugins: 1.16.0-1
                                            • sdncontroller.py: add support for new optional cookie argument to add-rule and del-rule functions
                                          • xcp-ng-pv-tools: 8.3-16
                                            • Update to XCP-ng Windows PV Tools 9.1.146.0
                                            • Include the XSTDVGA driver and improvements to the guest agent/installer

                                          UI

                                          • xo-lite: Update to 0.20.0-1
                                            • [VM/New] Added secureBoot support (PR #9423)
                                            • [Dashboard] Fix reactivity of dashboard (PR #9378)
                                            • [VM] Fixed duplicated ip addresses in the network tab Forum#101359 (PR #9547)
                                            • [Stats] Return null instead of 0 when no stats available (PR #9634)
                                            • [Treeview/Pool/Host] Add button to download bugtools (PR #9419)

                                          Network

                                          • gnutls: 3.3.29-10.2
                                            • Fix dane removal (no more replacing dane with devel package)
                                          • openssh: Update to 9.8p1-1.2.2
                                            • Deprecate old OpenSSH clients (7.2 and lower) that use weak SHA1 with ssh-rsa:
                                              • For now, a warning will ask to use an up to date client, on next update weak configurations will be rejected.
                                          • net-snmp: 5.9.3-8.2
                                            • Fix SNMP regression (daemon configuration was lost in earlier version)
                                          • xcp-ng-deps: 8.3-14
                                            • Install traceroute to troubleshoot connectivity problems

                                          Additional packages

                                          Best effort support is provided for additional packages provided by the XCP-ng project.

                                          • lldpd: version 1.0.4-1.1 provided for convenience in our repositories, as the EPEL version is not compatible anymore with the latest XCP-ng 8.3 updates. However, please prefer the pre-installed lldapd whenever possible.
                                          • nut: version 2.8.0-2.1 provided for convenience in our repositories, as the EPEL version is not compatible anymore with the latest XCP-ng updates.
                                            • User feedback is welcome

                                          Drivers updates

                                          More information about drivers and current versions is maintained on the drivers wiki page.

                                          • emulex-lpfc-alt: 14.4.393.31-1.1
                                            • This is an alternative driver which handles newer Emulex lpfc devices.
                                          • sfc-module-alt: 5.3.18.1012-1
                                            • Initial alternate driver for Solarflare SFN5XXX|6XXX|7XXX|8XXX|X2, version 5.3.18.1012

                                          Versions:

                                          • blktap: 3.55.5-6.3.xcpng8.3 -> 3.55.5-6.4.xcpng8.3
                                          • gnutls: 3.3.29-10.1.xcpng8.3 -> 3.3.29-10.2.xcpng8.3
                                          • kernel: 4.19.19-8.0.44.1.xcpng8.3 -> 4.19.19-8.0.46.1.xcpng8.3
                                          • net-snmp: 1:5.9.3-8.1.xcpng8.3 -> 1:5.9.3-8.2.xcpng8.3
                                          • openssh: 7.4p1-23.3.3.xcpng8.3 -> 9.8p1-1.2.2.xcpng8.3
                                          • sm: 3.2.12-17.1.xcpng8.3 -> 3.2.12-17.2.xcpng8.3
                                          • traceroute: 3:2.1.5-2.xcpng8.3
                                          • xapi: 26.1.3-1.3.xcpng8.3 -> 26.1.3-1.6.xcpng8.3
                                          • xcp-ng-deps: 8.3-13 -> 8.3-14
                                          • xcp-ng-pv-tools: 8.3-15.xcpng8.3 -> 8.3-16.xcpng8.3
                                          • xcp-ng-xapi-plugins: 1.15.0-1.xcpng8.3 -> 1.16.0-1.xcpng8.3
                                          • xen: 4.17.6-5.2.xcpng8.3 -> 4.17.6-6.1.xcpng8.3
                                          • xo-lite: 0.19.0-1.xcpng8.3 -> 0.20.0-1.xcpng8.3

                                          Optional packages:

                                          • lldpd: 1.0.4-1.1
                                          • nut: 2.8.0-2.1

                                          Test on XCP-ng 8.3

                                          If you are using XOSTOR, please refer to our documentation for the update method.

                                          yum clean metadata --enablerepo=xcp-ng-testing,xcp-ng-candidates
                                          yum update --enablerepo=xcp-ng-testing,xcp-ng-candidates
                                          reboot
                                          

                                          The usual update rules apply: pool coordinator first, etc.

                                          Known issues

                                          • On blktap update a non blocking error is reported,the fix is ongoing and will be delivered soon

                                          What to test

                                          The most important change is related to storage: adding QCOW2 support also affects the codebase managing VHD disks. What matters here is, above all, to detect any regression on VHD support (we tested it deeply, but on this matter there's no such thing as too much testing). Of course, you are also welcome to test the QCOW2 image format support.

                                          See the dedicated thread for more information.

                                          Other significant changes requiring attention:
                                          * SSH connectivity
                                          * SNMP, if you use it

                                          And, as usual, normal use and anything else you want to test.

                                          Test window before official release of the updates

                                          ~2 weeks

                                          dthenotD A 2 Replies Last reply Reply Quote 1
                                          • dthenotD Online
                                            dthenot Vates 🪐 XCP-ng Team @rzr
                                            last edited by

                                            @rzr Host updated 🙂

                                            1 Reply Last reply Reply Quote 1

                                            Hello! It looks like you're interested in this conversation, but you don't have an account yet.

                                            Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.

                                            With your input, this post could be even better 💗

                                            Register Login
                                            • First post
                                              Last post