The fix, which was proposed as a test to resolve some of the issues encountered, has been integrated into an official update candidate which will be released to everyone next time we publish updates. For more information on this update, you can consult the following post: https://xcp-ng.org/forum/post/96135
gduperrey
@gduperrey
Stormi's helper.
Science-Fiction and Fantasy lover. Love books, comics, animes...
Best posts made by gduperrey
-
RE: Epyc VM to VM networking slow
-
RE: High Fan Speed Issue on Lenovo ThinkSystem Servers
The
kernelRPM integrating the patch is now available on thexcp-ng-testingrepo. So you can already upgrade and use it. To do this, here are the commands:yum clean metadata --enablerepo=xcp-ng-testing yum update kernel --enablerepo=xcp-ng-testing rebootIt will be released to all our users in an upcoming security update or update train. We don't have a date yet.
-
RE: XCP-ng 8.3 updates announcements and testing
Updates published: https://xcp-ng.org/blog/2025/07/03/july-2025-security-and-maintenance-update-for-xcp-ng-8-3-lts/
Thank you for the tests!
-
RE: XCP-ng 8.2 updates announcements and testing
New update candidates for you to test!
As you may know, we group non-urgent updates together for a collective release, in order not to cause unnecessary maintenance for our users.
The moment to release such a batch has come, so here they are, ready for user tests before the final release.
XAPI:- Synced with XS82ECU1074
- Enhancement: robustification of the command
xe host-emergency-ha-disable - Correction of different issues:
- Performing a hard shutdown of a VM may hang due to unnecessary RBCA permission checks. An icon (yellow triangle) may then be displayed on some management applications, indicating that the shutdown process did not complete successfully.
- Canceling a hard shutdown of a hung VM fails because the cancel function only checks for proper shutdowns.
- Migrating VMs from 8.2.1 to 8.3 with the
xe vm-migratecommand may fail with the error 'Failure: Unknown tag/contents'. - You may encounter a 500 error (internal server error) when trying to retrieve RRD measurements from a powered off virtual machine.
- Enhancement: robustification of the command
- Synced with XS82ECU1074
xsconsole:- Synced with XS82ECU1074: Fix for a time-out when creating an iSCSI SR.
guest-templates-json:- Add generic templates for Linux BIOS and UEFI
- Synced with XS82ECU1085:
- Oracle 8 requires minimum 2 vCPUS.
- Added template for Ubuntu 24.04
sm:- Synced with XS82ECU1075
- Updated multipath.conf for several SANs
- Fix for CA-393194: Find the real PV in a VG before removing the VG.
- Synced with XS82ECU1075
blktap: Synced with XS82ECU1075: Improvements on coalesce performance.curl: Backport fixes for several CVE: CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-7264openssl: Update to version 1.0.2k-26 from CentOS 7 updates and backports of available CVE fixes from openssl upstream. Update from CentOS 7 Includes fixes for CVE-2021-3712, CVE-2022-2078 and CVE-2023-0286. Backport are fixing CVE-2019-1547, CVE-2019-1551 and CVE-2019-1563.xs-openssl: Rebased on version 1.1.1k-12 from CentOS 8 Stream. Include fixes for CVE-2023-5678, CVE-2023-3446, CVE-2023-3817 and a proper fix for CVE-2020-25659.zstd: Update to version 1.5.5 to avoid an extremely rare cases of corruptionxcp-ng-xapi-plugins: Enhance error reporting when a command run on a host fails.xenserver-status-report: Update to latest version, synced with XS82ECU1058python-defusedxml: Added as a new dependency ofxenserver-status-report.- Alternate Drivers: Updated to newer versions.
intel-i40e-alt: From version 2.22.20-3.1 to 2.22.20-5.1mellanox-mlnxen-alt: From version 5.9.0.5.5.0-1.1 to 5.9.0.5.5.0-1.2- More information about drivers and current versions is on the drivers page: (https://github.com/xcp-ng/xcp/wiki/Drivers).
- New alternate driver
mlx4-modules-alt: To resolve some issues with CX3 cards and SR-IOV, we added an updated version 4.9-7.1.0.0-LTS of this driver. - kernel-alt: Backport of a fix to correct cooling fan rotation speed on some Lenovo servers. For more information, you can read this thread on the forum.
As a dependency of XOSTOR:
http-nbd-transfer:- Try to open device and start HTTP server before notifying the user
- Install pyc and pyo files
Test on XCP-ng 8.2
From an up to date host:
yum clean metadata --enablerepo=xcp-ng-testing,xcp-ng-candidates yum update --enablerepo=xcp-ng-testing,xcp-ng-candidates rebootThe usual update rules apply: pool coordinator first, etc.
Versions
blktap: 3.37.4-4.1.xcpng8.2curl: 8.6.0-2.2.xcpng8.2forkexecd: 1.18.3-12.1.xcpng8.2gpumon: 0.18.0-20.1.xcpng8.2guest-templates-json: 1.10.7-1.2.xcpng8.2http-nbd-transfer: 1.4.0-1.xcpng8.2message-switch: 1.23.2-19.1.xcpng8.2ocaml-rrd-transport: 1.16.1-17.1.xcpng8.2ocaml-rrdd-plugin: 1.9.1-17.1.xcpng8.2ocaml-tapctl: 1.5.1-17.1.xcpng8.2ocaml-xcp-idl: 1.96.7-6.1.xcpng8.2ocaml-xen-api-client: 1.9.0-20.1.xcpng8.2ocaml-xen-api-libs-transitional: 2.25.7-1.1.xcpng8.2openssl: 1.0.2k-26.2.xcpng8.2python-defusedxml: 0.7.1-1.xcpng8.2rrd2csv: 1.2.6-17.1.xcpng8.2rrdd-plugins: 1.10.9-14.1.xcpng8.2sm: 2.30.8-13.1.xcpng8.2sm-cli: 0.23.0-63.1.xcpng8.2squeezed: 0.27.0-20.1.xcpng8.2varstored-guard: 0.6.2-17.xcpng8.2vhd-tool: 0.43.0-20.1.xcpng8.2wsproxy: 1.12.0-21.xcpng8.2xapi: 1.249.38-1.11.xcpng8.2xapi-nbd: 1.11.0-19.1.xcpng8.2xapi-storage: 11.19.0_sxm2-19.xcpng8.2xapi-storage-script: 0.34.1-18.1.xcpng8.2xcp-networkd: 0.56.2-17.xcpng8.2xcp-rrdd: 1.33.4-6.1.xcpng8.2xenopsd: 0.150.19-5.1.xcpng8.2xenserver-status-report: 1.3.16-3.xcpng8.2xcp-ng-xapi-plugins: 1.10.1-1.xcpng8.2xs-opam-repo: 6.35.13-4.xcpng8.2xs-openssl: 1.1.1k-12.3.xcpng8.2xsconsole: 10.1.13.1-2.1.xcpng8.2zstd: 1.5.5-1.el7
Optional packages:
kernel-alt: 4.19.265-2.xcpng8.2- Alternates drivers:
intel-i40e-alt: 2.22.20-5.1.xcpng8.2mellanox-mlnxen-alt: 5.9_0.5.5.0-1.2.xcpng8.2
New optional package:
mlx4-modules-alt: 4.9_7.1.0.0-1.xcpng8.2
What to test
Normal use and anything else you want to test. The closer to your actual use of XCP-ng, the better.
Test window before official release of the updates
~1 week.
-
RE: XCP-ng 8.2 updates announcements and testing
The update is published. Thanks for your tests!
Blog post: https://xcp-ng.org/blog/2022/11/04/november-2022-security-update/ -
RE: XCP-ng 8.3 updates announcements and testing
New update candidate for you to test!
A new update for the
Xenpackages is ready, which brings a significant improvement in live migration performance on AMD systems under heavy load, that we add to the previous batch of updates for a common publication.
Maintenance updates
xen: Improve migration performance on AMD systems under heavy load.
Test on XCP-ng 8.3
yum clean metadata --enablerepo=xcp-ng-testing,xcp-ng-candidates yum update --enablerepo=xcp-ng-testing,xcp-ng-candidates rebootThe usual update rules apply: pool coordinator first, etc.
Versions:
xen: 4.17.6-4.1.xcpng8.3
What to test
Normal use and anything else you want to test. If you have a pool with AMD processors, we're interested in your feedback regarding live migration under heavy load.
Test window before official release of the updates
~4/5 days
-
RE: RPM package vmfs6-tools missing for local migration procedure
Hello,
We've added a card to our backlog to investigate this topic.
-
RE: XCP-ng 8.3 updates announcements and testing
Update published: https://xcp-ng.org/blog/2025/01/23/january-2025-maintenance-update-for-xcp-ng-8-3/
Thank you for the tests!
-
RE: XCP-ng 8.3 updates announcements and testing
New update candidates for you to test!
A new batch of non-urgent updates is ready for user tests before a future collective release. Below are the details about these.
amd-microcode: Update AMD microcode to the 2024-11-21 drop- Updates firmware for families 17h and 19h CPUs. For the first time, AMD published updates for non-server CPUs. One can assume that they started supporting microcode update for these, contrarily to what they did in the past, and that these updates thus fix various bugs and vulnerabilities. This is only (sensible) speculation at the moment, though.
grub: Backport VLAN networking support for UEFI PXE boot.iperf3: Upgrade to version 3.9-13 from CentOS 7- Includes a security fix for CVE-2023-38403
kernel: Backport of a fix to correct cooling fan rotation speed on some Lenovo servers. For more information, you can read this thread on the forum.kexec-tools: Backport of a patch removing kernel_version(). Fixing a bug for kernel with a patchlevel greater than 255.netdata: Fixed an issue that could occur when quickly uninstalling the package, right after an unfinished installation, and leave a service in an undetermined status.slang: Fixed display and input issues in optional packagemc.sm: Contains a fix for leaf coalesce where the size of the leaf to coalesce was wrongly computed before deciding if it was a live coalesce or not, it resulted in some leaf having too much data to coalesce not successing the live coalesce and staying in this state indefinitely.xapi:- Fixed a malfunction related to the absence of a certificate, which could cause a loop.
- Fixed and improved various points in IPv6, related to management, reboot and re-initialization.
xo-lite: Update to version 0.6.0. For more details, you can consult the blog post on the latest release of Xen Orchestra.
Optional packages:
kernel-alt: Backport of a fix to correct cooling fan rotation speed on some Lenovo servers. For more information, you can read this thread on the forum.socat: Update the package to version1.7.4.1which includes a fix for a buffer overflow and security fixes.traceroute: Updated to version 2.1.5.- Alternate Drivers: Updated to newer versions.
broadcom-bnxt-en-alt: From version 1.10.2_227.0.130.0 to 1.10.3_231.0.162.0intel-i40e-alt: From version 2.22.20-3.1 to 2.26.8- More information about drivers and current versions is on the drivers page: (https://github.com/xcp-ng/xcp/wiki/Drivers).
Test on XCP-ng 8.3
From an up-to-date host:
yum clean metadata --enablerepo=xcp-ng-testing yum update --enablerepo=xcp-ng-testing rebootThe usual update rules apply: pool coordinator first, etc.
Versions
amd-microcode: 20240503-1.1.xcpng8.3grub: 2.06-4.0.2.1.xcpng8.3iperf3: 3.9-13.xcpng8.3kernel: 4.19.19-8.0.37.1.xcpng8.3kexec-tools: 2.0.15-20.1.xcpng8.3netdata: 1.44.3-1.2.xcpng8.3slang: 2.3.2-11.xcpng8.3sm: 3.2.3-1.13.xcpng8.3xapi: 24.19.2-1.9.xcpng8.3xo-lite: 0.6.0-1.xcpng8.3
Optional packages:
kernel-alt: 4.19.322+1-1.xcpng8.3socat: 1.7.4.1-6.xcpng8.3traceroute: 2.1.5-2.xcpng8.3- Alternate drivers:
broadcom-bnxt-en-alt: 1.10.3_231.0.162.0-1.xcpng8.3intel-i40e-alt: 2.26.8-1.xcpng8.3
What to test
Normal use and anything else you want to test. The closer to your actual use of XCP-ng, the better.
Test window before official release of the updates
None defined, but early feedback is always better than late feedback, which is in turn better than no feedback

-
RE: XCP-ng 8.2 updates announcements and testing
New security update candidates (xen)
Xen is being updated to mitigate some vulnerabilities:
- XSA-326: Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored.
- XSA-419: Xenstore: Cooperating guests can create arbitrary numbers of nodes
- XSA-414: A malicious guest can cause xenstored to crash, resulting in the inability to create new guests or to change the configuration of running guests.
- XSA-415: Xenstore: Guests can create orphaned Xenstore nodes
- XSA-416: Xenstore: Guests can cause Xenstore to not free temporary memory
- XSA-417: Xenstore: Guests can get access to Xenstore nodes of deleted domains
- XSA-418: Xenstore: Guests can crash xenstored via exhausting the stack
- XSA-420: Oxenstored 32->31 bit integer truncation issues. A malicious or buggy guest can write a packet into the xenstore ring which causes 32-bit builds of oxenstored to busy loop.
- XSA-421: Xenstore: Guests can create arbitrary number of nodes via transactions
Test on XCP-ng 8.2
From an up to date host:
yum clean metadata --enablerepo=xcp-ng-testing yum update xen-dom0-libs xen-dom0-tools xen-hypervisor xen-libs xen-tools --enablerepo=xcp-ng-testing rebootVersions:
- xen-*: 4.13.4-9.27.1.xcpng8.2
What to test
Normal use and anything else you want to test. The closer to your actual use of XCP-ng, the better.
Test window before official release of the updates
~2 days.
Latest posts made by gduperrey
-
RE: XCP-ng 8.3 updates announcements and testing
New security update candidate for you to test!
A new security vulnerability has been detected and fixed for xen.
This was introduced by an upstream commit, and detected before the Xen Project did any new release. Therefore this does not impact any upstream release, and there is no Xen Security Advisory this time. But that change was backported into XCP-ng
xenpackage, therefore XCP-ng is impacted.
Security updates
xen: Fix a security issue where insufficient memory sanitization during guest creation can lead to information leakage from previous guests and potential privilege escalation
Test on XCP-ng 8.3
yum clean metadata --enablerepo=xcp-ng-testing,xcp-ng-candidates yum update --enablerepo=xcp-ng-testing,xcp-ng-candidates rebootThe usual update rules apply: pool coordinator first, etc.
Versions:
xen: 4.17.6-5.2.xcpng8.3
What to test
Normal use and anything else you want to test.
Test window before official release of the updates
~2 days
-
RE: XCP-ng 8.3 updates announcements and testing
@acebmxer I invite you to open a ticket through the support ticketing system.
I do not connect remotely myself and I am also unable to provide support for Xen-Orchestra.
-
RE: XCP-ng 8.3 updates announcements and testing
@acebmxer Hello,
What you're describing sounds more like an RPU issue with Xen-Orchestra than a problem related to XCP-ng updates. But I could be wrong

However, since these updates affect Xen, a reboot was clearly indicated in our procedure. So a simple restart of the toolstack isn't enough. You did the right thing by rebooting afterward.
Are you using XO Appliance or from source?
If it's XO Appliance, you can open a ticket to ask for help analyzing the situation and see if anything in the logs or configuration explains this behavior.
If it's from source, for the same issue, I would suggest you start a separate thread on the forum so other users can help you with the analysis

In any case, it's great if your pool is working in the end

-
RE: IPMI/ IDRAC (XAPI)
An update for
ipmitoolhas just been released, incorporating a fix for the issue you were experiencing: https://xcp-ng.org/blog/2026/03/19/march-2026-security-updates-for-xcp-ng-8-3-lts/ -
RE: XCP-ng 8.3 updates announcements and testing
Thank you everyone for your tests and your feedback!
The updates are live now: https://xcp-ng.org/blog/2026/03/19/march-2026-security-updates-for-xcp-ng-8-3-lts/
-
RE: XCP-ng 8.3 updates announcements and testing
New security and maintenance update candidate for you to test!
A new security vulnerability, XSA-480, has been detected and fixed for xen.
Security updates
xen: A vulnerability has been discovered on x86 Intel systems with EPT support, where unintended host or guest memory regions can be accessed from a VM's memory cache under any workload. This can lead to privilege escalation, denial of service (DoS) attacks affecting the entire host, or information leaks.
On XCP-ng 8.3, x86 HVM/PVH VMs can leverage this vulnerability.
There are no mitigations.
A VSA was also published by our security team: https://docs.vates.tech/security/advisories/2026/vates-sa-2026-005/
Maintenance updates
We are taking this opportunity to release an update for
ipmitoolfollowing some feedback from our users regarding the display of an error message in Xen-Orchestra, with certain models of DELL servers, in relation to the commandipmitool lan print.Test on XCP-ng 8.3
yum clean metadata --enablerepo=xcp-ng-testing,xcp-ng-candidates yum update --enablerepo=xcp-ng-testing,xcp-ng-candidates rebootThe usual update rules apply: pool coordinator first, etc.
Versions:
ipmitool: 1.8.19-11.2.xcpng8.3xen: 4.17.6-5.1.xcpng8.3
What to test
Normal use and anything else you want to test.
Test window before official release of the updates
~2 days
-
RE: XCP-ng 8.3 updates announcements and testing
@abudef In case of a shutdown, I turn off the secondary servers first. Once they are off, I shut down the primary server. This ensures that if the secondary servers have information to send to the primary, they can do so, whereas otherwise, they can wait to shut down.
In case of a pool reboot, I reboot the primary server first, and once it is accessible, I reboot the secondary servers.
-
RE: XCP-ng 8.3 updates announcements and testing
For XO, I suggest you start a separate thread.
Regarding the host issue, without more details or information, it's difficult to say anything at the moment, especially since I haven't been able to reproduce it myself.
-
RE: XCP-ng 8.3 updates announcements and testing
As explained, I haven't observed such a delay on our end during our testing.
As Maniix suggests, you can see what's happening by pressing "Esc" to see which step is taking longer.
From what I've heard internally, a common reason for this lengthy step is when a shared server was running on a VM and that VM was shut down. The host then takes a very long time to shut down or restart.
-
RE: XCP-ng 8.3 updates announcements and testing
@abudef I've updated and rebooted numerous hosts with these updates and haven't noticed any significant slowdowns.
Do you have any additional information in the logs?