We are pleased to announce the release of Apache CloudStack CloudMonkey v6.4.0, the latest version of the popular command-line interface tool for managing Apache CloudStack environments.
65 posts tagged with "announcement"
View All TagsApache CloudStack 4.19.0.0 Release
The Apache Software Foundation and the Apache CloudStack Project Announces Apache® CloudStack® v4.19.
Apache CloudStack 4.19 is the most recent release of the cloud management platform. It comes as a product of extensive contributions from the development community and is a LTS release, guaranteeing ongoing maintenance and support for a period of 18 months.
Apache CloudStack 4.18.1.0 Release
Apache CloudStack CloudMonkey 6.3.0 Release
Apache CloudStack 4.18.0.0 LTS Release
Apache CloudStack LTS Maintenance Release 4.17.2.0
Apache CloudStack LTS Maintenance Release 4.17.2.0
The Apache CloudStack project is pleased to announce the release of CloudStack 4.17.2.0.
The CloudStack 4.17.2.0 release is a maintenance release as part of its 4.17.x LTS branch and contains more than 20 fixes since the CloudStack 4.17.1.0 release.
CloudStack Collaboration Conference 2022 - November 14-16
The global Apache CloudStack community is hosting its major annual event - CloudStack Collaboration Conference, running from November 14th to November 16th 2022. The conference will be taking place in Sofia, Bulgaria. However, the conference is hybrid, allowing speakers and attendees to join virtually.
Apache CloudStack LTS Maintenance Release 4.17.1.0
[ADVISORY] Apache CloudStack SAML Single Sign-On XXE (CVE-2022-35741)
Apache CloudStack version 4.5.0 and later has a SAML 2.0 authentication Service Provider plugin which is found to be vulnerable to XML external entity (XXE) injection. This plugin is not enabled by default and the attacker would require that this plugin be enabled to exploit the vulnerability. When the SAML 2.0 plugin is enabled in affected versions of Apache CloudStack could potentially allow the exploitation of XXE vulnerabilities. The SAML 2.0 messages constructed during the authentication flow in Apache CloudStack are XML-based and the XML data is parsed by various standard libraries that are now understood to be vulnerable to XXE injection attacks such as arbitrary file reading, possible denial of service, server-side request forgery (SSRF) on the CloudStack management server.
[ADVISORY] Apache CloudStack Advisory on KVM Shared Mount Point issues on version 4.17.0.0
On 14th June 2022, a new issue affecting only KVM users using Shared Mount Point storage was reported [1]. This issue affects the creation and the usage of existing Shared Mount Point storage pools on Apache CloudStack 4.17.0.0.
Apache CloudStack 4.17.0.0 added support for the StorPool storage based on Shared Mount Point. However, the current version of CloudStack doesn't allow multiple implementations of Shared Mount Point storage pool providers, causing the StorPool provider to override the default implementation. This affected the other storage pool providers for Shared Mount Point since CloudStack tries to add them as a StorPool storage pool.
To mitigate the issue, a CloudStack administrator needs to do the following on version 4.17.0.0:
- On each management server: stop the CloudStack management service, remove the Storpool plugin jar on /usr/share/cloudstack-management/lib/cloud-plugin-storage-volume-storpool-4.17.0.0.jar and restart the CloudStack management service
- On each KVM host: stop the CloudStack agent service, remove the StorPool plugin jar on /usr/share/cloudstack-agent/lib/cloud-plugin-storage-volume-storpool-4.17.0.0.jar and restart the CloudStack agent service
Note: This workaround removes the StorPool plugin support. StorPool users should not apply the workaround to continue using their Storpool storage.
This issue will be fixed in the upcoming CloudStack version 4.17.1.0.