Updates published: https://xcp-ng.org/blog/2025/10/23/october-2025-security-and-maintenance-update-for-xcp-ng-8-3-lts/
Thank you for the tests!
Updates published: https://xcp-ng.org/blog/2025/10/23/october-2025-security-and-maintenance-update-for-xcp-ng-8-3-lts/
Thank you for the tests!
New updates join the previous batch of update candidates. They're the last ones.
A new XSA (Xen Security Advisory) was published on the 21th of October, and updates to Xen address the disclosed vulnerabilities. We also reverted a change in XAPI that we deemed risky.
Additionally, we also publish an updated Intel-Ice alternate driver.
xen:
xapi:
Optional packages:
intel-ice-alt: Update driver sources to v1.17.2yum clean metadata --enablerepo=xcp-ng-testing,xcp-ng-candidates
yum update --enablerepo=xcp-ng-testing,xcp-ng-candidates
reboot
The usual update rules apply: pool coordinator first, etc.
xapi: 25.27.0-2.2.xcpng8.3xen: 4.17.5-20.2.xcpng8.3Optional packages:
intel-ice-alt: 1.17.2-1.xcpng8.3Normal use and anything else you want to test.
~2 days.
The kernel-alt is there for debugging purposes and should not be used during normal operation, especially if you want to maintain optimal performance.
Alternative driver versions may be offered instead of driver updates. This is the case for the Intel i40e. The default version is 2.25.11-2, and its alternative (-alt) version is 2.26.8-1. This is simply a more up-to-date version of the driver.
You can therefore try this version (which is independent of the kernel-alt). It installs over the default XCP-ng installation and therefore over the standard kernel:
yum install intel-i40e-alt
Hopefully this more up-to-date version will help you.
XCP-ng 8.2 has just reached its end of life, but the adventure continues with XCP-ng 8.3 (and other versions to come). You can read the communication on this point on our blog: https://xcp-ng.org/blog/2025/09/16/xcp-ng-8-2-lts-reached-its-end-of-life/
To continue benefiting from updates and developments, we invite you, if you haven't already done so, to upgrade your systems to XCP-ng 8.3.
A relevant thread has been around for quite some time if you want to participate in early testing of the updates: https://xcp-ng.org/forum/topic/9964/xcp-ng-8-3-updates-announcements-and-testing/
Updates published: https://xcp-ng.org/blog/2025/09/11/september-2025-security-update-for-xcp-ng-8-3-lts/
Thank you for the tests!
Updates published: https://xcp-ng.org/blog/2025/09/11/september-2025-security-update-for-xcp-ng-8-2-lts/
Thank you for the tests!
A new XSA (Xen Security Advisory) was published on the 9th of September, and an update to Xen addresses it.
xen-*:
yum clean metadata --enablerepo=xcp-ng-candidates
yum update --enablerepo=xcp-ng-candidates
reboot
The usual update rules apply: pool coordinator first, etc.
xen: 4.13.5-9.49.4.xcpng8.2~2 days.
Another XSA (474) was released the same day regarding XAPI. Since the attack vector differs and is not easily exploitable in 8.2, we have not released a patch for it, unlike in 8.3.
As a reminder, XCP-ng 8.2 LTS will no longer be supported as of September 16, 2025.
We therefore strongly encourage you to migrate your pools to XCP-ng 8.3 LTS to continue benefiting from the latest security fixes and improvements.
News XSAs (Xen Security Advisory) were published on the 9th of September, and updates to Xen & XAPI address them.
xapi:
xen-*:
yum clean metadata --enablerepo=xcp-ng-candidates
yum update --enablerepo=xcp-ng-candidates
reboot
The usual update rules apply: pool coordinator first, etc.
xapi: 25.6.0-1.12.xcpng8.3xen: 4.17.5-15.3.xcpng8.3Normal use and anything else you want to test.
~2 days.
Updates published: https://xcp-ng.org/blog/2025/09/01/september-2025-maintenance-update-for-xcp-ng-8-3/
Thank you for the tests!
A new non-urgent update is ready for user testing before a future collective release. Below are the details.
broadcom-bnxt-en: Update driver to version 1.10.3_232.0.155.5yum clean metadata --enablerepo=xcp-ng-testing
yum update --enablerepo=xcp-ng-testing
reboot
A reboot is preferable to load the new version of the driver.
The usual update rules apply: pool coordinator first, etc.
broadcom-bnxt-en: 1.10.3_232.0.155.5-1.xcpng8.3Normal use and anything else you want to test.
None defined, but early feedback is always better than late feedback, which is in turn better than no feedback 
A new non-urgent update is ready for user testing before a future collective release. Below are the details.
A bug was found in the Emergency Network Reset due to desynchronisation between xsconsole and XAPI. This issue prevented the Emergency Network Reset from working at all. This update includes the fixes from the upstream xsconsole project to fix it.
xsconsole
yum clean metadata --enablerepo=xcp-ng-testing
yum update --enablerepo=xcp-ng-testing
reboot
Reboot is not strictly necessary, but the xsconsole instance running on the first virtual terminal of your host won't be restarted otherwise. If you do not reboot, make sure to start xsconsole from another terminal after the update.
The usual update rules apply: pool coordinator first, etc.
xsconsole: 11.0.8-1.2.xcpng8.3Normal xsconsole usage, is still useful feedback. However, if possible, the most helpful test would be performing an Emergency Network Reset through xsconsole, making actual configuration changes and verifying that they are correctly applied after reboot.
None defined, but early feedback is always better than late feedback, which is in turn better than no feedback 
The fix, which was proposed as a test to resolve some of the issues encountered, has been integrated into an official update candidate which will be released to everyone next time we publish updates. For more information on this update, you can consult the following post: https://xcp-ng.org/forum/post/96135
A new batch of non-urgent updates is ready for user tests before a future collective release. Below are the details about these.
blktap: Fix a bad integer conversion that interrupts valid coalesce calls on large VDIs. This fixes an error that could occur on VHD coalesces, generating logs on the SMAPI side.kernel:
xapi & xen:
/etc/xenopsd.conf.d directory, in which users can add a .conf file with configuration values for xenopsd./etc/xenopsd.conf.d/custom.conf with the following line:xen-platform-pci-bar-uc=false
xe-toolstack-restartxo-lite:
yum clean metadata --enablerepo=xcp-ng-testing
yum update --enablerepo=xcp-ng-testing
reboot
The usual update rules apply: pool coordinator first, etc.
blktap: 3.55.5-2.3.xcpng8.3kernel: 4.19.19-8.0.38.4.xcpng8.3xapi: 25.6.0-1.11.xcpng8.3xen: 4.17.5-15.2.xcpng8.3xo-lite: 0.13.1-1.xcpng8.3Normal use and anything else you want to test.
None defined, but early feedback is always better than late feedback, which is in turn better than no feedback 
Hello,
We've added a card to our backlog to investigate this topic.
Updates published: https://xcp-ng.org/blog/2025/07/29/july-2025-security-update-2-for-xcp-ng-8-2-lts/
Thank you for the tests!
A new XSA (Xen Security Advisory) was published on the 8th of July, and an update to Xen addresses it.
linux-firmware: Update to 20250626-1 as redistributed by XenServer.xen-*:
yum clean metadata --enablerepo=xcp-ng-testing
yum update --enablerepo=xcp-ng-testing
reboot
The usual update rules apply: pool coordinator first, etc.
linux-firmware: 20190314-11.3.xcpng8.2xen: 4.13.5-9.49.3.xcpng8.2cpuid installed, run the command following command:lscpu | grep -q AMD && lscpu | grep -qi "cpu family.* 25$" && [ $(($(cpuid -1 -r -l 0x80000021 | grep eax | sed -r 's/.*eax=([^ ]+) .*/\1/') & 0x20)) -eq 32 ] && echo OK
This should print OK if your system is protected against XSA-471.
~3 days.
@manilx We recently upgraded our Koji build system. This may have caused disruptions in this recent update release yesterday, where an XML file was generated multiple times. This has now been fixed and should not happen again. This may explain the issue encountered this time, particularly with the notification of updates via XO.
Note that normally yum metadata expires after a few hours and so it should normally return to normal on its own.
@manilx said in XCP-ng 8.3 updates announcements and testing:
yum clean all
I can't explain it. I can't say what's going on on your system, especially with so little information.
Personally, I run the following commands all the time:
yum clean metadata ; yum update
I very rarely need to use yum clean all, and I don't remember having to do an additional rm. And yet, I run the above commands a lot during testing campaigns.
@flakpyro Yes, it always takes a little time for the mirrors to synchronize.
I'm getting correct feedback from the main repository (https://updates.xcp-ng.org/) with the correct updates available.
Updates published: https://xcp-ng.org/blog/2025/07/15/july-2025-security-update-2-for-xcp-ng-8-3-lts/
Thank you for the tests!