Updates published: https://xcp-ng.org/blog/2025/09/11/september-2025-security-update-for-xcp-ng-8-3-lts/
Thank you for the tests!
Updates published: https://xcp-ng.org/blog/2025/09/11/september-2025-security-update-for-xcp-ng-8-3-lts/
Thank you for the tests!
Updates published: https://xcp-ng.org/blog/2025/09/11/september-2025-security-update-for-xcp-ng-8-2-lts/
Thank you for the tests!
A new XSA (Xen Security Advisory) was published on the 9th of September, and an update to Xen addresses it.
xen-*
:
yum clean metadata --enablerepo=xcp-ng-candidates
yum update --enablerepo=xcp-ng-candidates
reboot
The usual update rules apply: pool coordinator first, etc.
xen
: 4.13.5-9.49.4.xcpng8.2~2 days.
Another XSA (474) was released the same day regarding XAPI. Since the attack vector differs and is not easily exploitable in 8.2, we have not released a patch for it, unlike in 8.3.
As a reminder, XCP-ng 8.2 LTS will no longer be supported as of September 16, 2025.
We therefore strongly encourage you to migrate your pools to XCP-ng 8.3 LTS to continue benefiting from the latest security fixes and improvements.
News XSAs (Xen Security Advisory) were published on the 9th of September, and updates to Xen & XAPI address them.
xapi
:
xen-*
:
yum clean metadata --enablerepo=xcp-ng-candidates
yum update --enablerepo=xcp-ng-candidates
reboot
The usual update rules apply: pool coordinator first, etc.
xapi
: 25.6.0-1.12.xcpng8.3xen
: 4.17.5-15.3.xcpng8.3Normal use and anything else you want to test.
~2 days.
Updates published: https://xcp-ng.org/blog/2025/09/01/september-2025-maintenance-update-for-xcp-ng-8-3/
Thank you for the tests!
A new non-urgent update is ready for user testing before a future collective release. Below are the details.
broadcom-bnxt-en
: Update driver to version 1.10.3_232.0.155.5yum clean metadata --enablerepo=xcp-ng-testing
yum update --enablerepo=xcp-ng-testing
reboot
A reboot is preferable to load the new version of the driver.
The usual update rules apply: pool coordinator first, etc.
broadcom-bnxt-en
: 1.10.3_232.0.155.5-1.xcpng8.3Normal use and anything else you want to test.
None defined, but early feedback is always better than late feedback, which is in turn better than no feedback
A new non-urgent update is ready for user testing before a future collective release. Below are the details.
A bug was found in the Emergency Network Reset due to desynchronisation between xsconsole
and XAPI. This issue prevented the Emergency Network Reset from working at all. This update includes the fixes from the upstream xsconsole
project to fix it.
xsconsole
yum clean metadata --enablerepo=xcp-ng-testing
yum update --enablerepo=xcp-ng-testing
reboot
Reboot is not strictly necessary, but the xsconsole
instance running on the first virtual terminal of your host won't be restarted otherwise. If you do not reboot, make sure to start xsconsole
from another terminal after the update.
The usual update rules apply: pool coordinator first, etc.
xsconsole
: 11.0.8-1.2.xcpng8.3Normal xsconsole usage, is still useful feedback. However, if possible, the most helpful test would be performing an Emergency Network Reset through xsconsole
, making actual configuration changes and verifying that they are correctly applied after reboot.
None defined, but early feedback is always better than late feedback, which is in turn better than no feedback
The fix, which was proposed as a test to resolve some of the issues encountered, has been integrated into an official update candidate which will be released to everyone next time we publish updates. For more information on this update, you can consult the following post: https://xcp-ng.org/forum/post/96135
A new batch of non-urgent updates is ready for user tests before a future collective release. Below are the details about these.
blktap
: Fix a bad integer conversion that interrupts valid coalesce calls on large VDIs. This fixes an error that could occur on VHD coalesces, generating logs on the SMAPI side.kernel
:
xapi
& xen
:
/etc/xenopsd.conf.d
directory, in which users can add a .conf
file with configuration values for xenopsd./etc/xenopsd.conf.d/custom.conf
with the following line:xen-platform-pci-bar-uc=false
xe-toolstack-restart
xo-lite
:
yum clean metadata --enablerepo=xcp-ng-testing
yum update --enablerepo=xcp-ng-testing
reboot
The usual update rules apply: pool coordinator first, etc.
blktap
: 3.55.5-2.3.xcpng8.3kernel
: 4.19.19-8.0.38.4.xcpng8.3xapi
: 25.6.0-1.11.xcpng8.3xen
: 4.17.5-15.2.xcpng8.3xo-lite
: 0.13.1-1.xcpng8.3Normal use and anything else you want to test.
None defined, but early feedback is always better than late feedback, which is in turn better than no feedback
Hello,
We've added a card to our backlog to investigate this topic.
Updates published: https://xcp-ng.org/blog/2025/07/29/july-2025-security-update-2-for-xcp-ng-8-2-lts/
Thank you for the tests!
A new XSA (Xen Security Advisory) was published on the 8th of July, and an update to Xen addresses it.
linux-firmware
: Update to 20250626-1 as redistributed by XenServer.xen-*
:
yum clean metadata --enablerepo=xcp-ng-testing
yum update --enablerepo=xcp-ng-testing
reboot
The usual update rules apply: pool coordinator first, etc.
linux-firmware
: 20190314-11.3.xcpng8.2xen
: 4.13.5-9.49.3.xcpng8.2cpuid
installed, run the command following command:lscpu | grep -q AMD && lscpu | grep -qi "cpu family.* 25$" && [ $(($(cpuid -1 -r -l 0x80000021 | grep eax | sed -r 's/.*eax=([^ ]+) .*/\1/') & 0x20)) -eq 32 ] && echo OK
This should print OK
if your system is protected against XSA-471.
~3 days.
@manilx We recently upgraded our Koji build system. This may have caused disruptions in this recent update release yesterday, where an XML file was generated multiple times. This has now been fixed and should not happen again. This may explain the issue encountered this time, particularly with the notification of updates via XO.
Note that normally yum metadata expires after a few hours and so it should normally return to normal on its own.
@manilx said in XCP-ng 8.3 updates announcements and testing:
yum clean all
I can't explain it. I can't say what's going on on your system, especially with so little information.
Personally, I run the following commands all the time:
yum clean metadata ; yum update
I very rarely need to use yum clean all
, and I don't remember having to do an additional rm
. And yet, I run the above commands a lot during testing campaigns.
@flakpyro Yes, it always takes a little time for the mirrors to synchronize.
I'm getting correct feedback from the main repository (https://updates.xcp-ng.org/) with the correct updates available.
Updates published: https://xcp-ng.org/blog/2025/07/15/july-2025-security-update-2-for-xcp-ng-8-3-lts/
Thank you for the tests!
A new XSA (Xen Security Advisory) was published on the 8th of July, related to hardware vulnerabilities in several AMD CPUS. Updated microcode mitigate it, and Xen is updated to adapt to the changes in the CPU features. We also publish other non-urgent updates which we had in the pipe for the next update release.
amd-microcode
:
xen-*
:
http-nbd-transfer
:
xo-lite
: update to 0.12.1
yum clean metadata --enablerepo=xcp-ng-testing
yum update --enablerepo=xcp-ng-testing
reboot
The usual update rules apply: pool coordinator first, etc.
amd-microcode
: 20250626-1.1.xcpng8.3http-nbd-transfer
: 1.7.0-1.xcpng8.3xen
: 4.17.5-15.1.xcpng8.3xo-lite
: 0.12.1-1.xcpng8.3Normal use and anything else you want to test.
~2 days.
We're not yet familiar with Netdata Cloud. Could you describe your requirements in more detail? What are you trying to accomplish?
The installation and use of third-party packages for XCP-ng is described in the following documentation: https://docs.xcp-ng.org/management/additional-packages/
We currently offer a version of Netdata in our repositories, but as a best-effort support option.
If you install a version from another source, this is not supported by us. You must therefore be careful to ensure that what you install does not overwrite or modify packages already present and used by XCP-ng. Furthermore, this will not persist during a server upgrade (a major version change, such as from 8.2 to 8.3, for example), and you will need to install it again, taking the same precautions.
Updates published: https://xcp-ng.org/blog/2025/07/03/july-2025-security-and-maintenance-update-for-xcp-ng-8-2-lts/
Thank you for the tests!
Updates published: https://xcp-ng.org/blog/2025/07/03/july-2025-security-and-maintenance-update-for-xcp-ng-8-3-lts/
Thank you for the tests!