Apache CloudStack security releases 4.18.1.1 and 4.19.0.1 address the CVEs listed below. Affected users are recommended to upgrade their CloudStack installations.
76 posts tagged with "announcement"
View All TagsApache CloudStack CloudMonkey 6.4.0 Release
Apache CloudStack 4.19.0.0 Release
The Apache Software Foundation and the Apache CloudStack Project Announces Apache® CloudStack® v4.19.
Apache CloudStack 4.19 is the most recent release of the cloud management platform. It comes as a product of extensive contributions from the development community and is a LTS release, guaranteeing ongoing maintenance and support for a period of 18 months.
Apache CloudStack 4.18.1.0 Release
Apache CloudStack CloudMonkey 6.3.0 Release
Apache CloudStack 4.18.0.0 LTS Release
Apache CloudStack LTS Maintenance Release 4.17.2.0
Apache CloudStack LTS Maintenance Release 4.17.2.0
The Apache CloudStack project is pleased to announce the release of CloudStack 4.17.2.0.
The CloudStack 4.17.2.0 release is a maintenance release as part of its 4.17.x LTS branch and contains more than 20 fixes since the CloudStack 4.17.1.0 release.
CloudStack Collaboration Conference 2022 - November 14-16
The global Apache CloudStack community is hosting its major annual event - CloudStack Collaboration Conference, running from November 14th to November 16th 2022. The conference will be taking place in Sofia, Bulgaria. However, the conference is hybrid, allowing speakers and attendees to join virtually.
Apache CloudStack LTS Maintenance Release 4.17.1.0
[ADVISORY] Apache CloudStack SAML Single Sign-On XXE (CVE-2022-35741)
Apache CloudStack version 4.5.0 and later has a SAML 2.0 authentication Service Provider plugin which is found to be vulnerable to XML external entity (XXE) injection. This plugin is not enabled by default and the attacker would require that this plugin be enabled to exploit the vulnerability. When the SAML 2.0 plugin is enabled in affected versions of Apache CloudStack could potentially allow the exploitation of XXE vulnerabilities. The SAML 2.0 messages constructed during the authentication flow in Apache CloudStack are XML-based and the XML data is parsed by various standard libraries that are now understood to be vulnerable to XXE injection attacks such as arbitrary file reading, possible denial of service, server-side request forgery (SSRF) on the CloudStack management server.





