Piergiorgio Venuti

Updates IaaS Infrastructure – version 5.0

New IaaS Architecture was released February 3th!

The following section list all the features, improvements, and fixed included in IaaS Service  5.0 release:

Type Summary
Improvement Now Redis is used to lock LVM operations.
Improvement RHEL/CentOS 5.x Ruby packages compiled with OpenSSL 1.0.1e.
Improvement Erlang upgraded to 18.3 version.
Improvement Improved reliability and cloud engine.
Fix Fixed the issue when after editing a swap disk that had been manually added (built or attached), the disk was removed from fstab and wasn’t available anymore.
Fix Fixed the issue when Virtual Servers built on vCloud compute resources were shut down after increasing the disk size.
Fix Fixed the problem when under certain conditions the vCloud user group created from GUI got duplicated. This led to duplicated resource pools and general misconfiguration of vCloud.
Fix Fixed the problem when in multi-vCenter environment the stats have not been collected from one of vCenter instances.
Fix Fixed the issue with inserting media to vCloud Director VS.
Fix Fixed the synchronization problem when deleting a media file from the catalog in vCloud Director was not updated in SOD CP.
Fix Fixed the issue when vCloud console did not show the correct size for Windows VSs.
Fix Fixed the problem when password became out of sync in vCloud Director after an admin had been editing a user profile and left the password blank.
Fix Fixed the problem when it was impossible to upload an ISO when the image extension was with capital ISO letters.
Fix Fixed moving Firewall Rules down
Fix Fixed the problem when Windows VS build failed if owner’s name contained incompatible character encodings: ASCII-8BIT and UTF-8
Fix Fixed a range of minor bugs related to VPN IPsec of vCloud Director integration.
Fix Fixed the problem when it was impossible to build a VS from ISO with operating system Windows.
Fix Fixed the error which occurred for a backup’s transaction log item.
Fix Fixed the broken autoscaling for load balancer clusters (autoscaling type) .

 

Share


RSS

More Articles…

Categories …

Tags

RSS Unknown Feed

RSS Full Disclosure

  • CVE-2025-32978 - Quest KACE SMA Unauthenticated License Replacement June 24, 2025
    Posted by Seralys Research Team via Fulldisclosure on Jun 23 Seralys Security Advisory | https://www.seralys.com/research ====================================================================== Title: Unauthenticated License Replacement Product: Quest KACE Systems Management Appliance (SMA) Affected: Confirmed on 14.1 (older versions likely affected) Fixed in: 13.0.385, 13.1.81, 13.2.183, 14.0.341(Patch 5), 14.1.101(Patch 4) Vendor: Quest Software Discovered: April...
  • CVE-2025-32977 - Quest KACE Unauthenticated Backup Upload June 24, 2025
    Posted by Seralys Research Team via Fulldisclosure on Jun 23 Seralys Security Advisory | https://www.seralys.com/research ====================================================================== Title: Unauthenticated Backup Upload Product: Quest KACE Systems Management Appliance (SMA) Affected: Confirmed on 14.1 (older versions likely affected) Fixed in: 13.0.385, 13.1.81, 13.2.183, 14.0.341(Patch 5), 14.1.101(Patch 4) Vendor: Quest Software Discovered: April 2025...
  • CVE-2025-32976 - Quest KACE SMA 2FA Bypass June 24, 2025
    Posted by Seralys Research Team via Fulldisclosure on Jun 23 Seralys Security Advisory | https://www.seralys.com/research ====================================================================== Title: 2FA Bypass Product: Quest KACE Systems Management Appliance (SMA) Affected: Confirmed on 14.1 (older versions likely affected) Fixed in: 13.0.385, 13.1.81, 13.2.183, 14.0.341(Patch 5), 14.1.101(Patch 4) Vendor: Quest Software Discovered: April 2025 Severity: HIGH...
  • CVE-2025-32975 - Quest KACE SMA Authentication Bypass June 24, 2025
    Posted by Seralys Research Team via Fulldisclosure on Jun 23 Seralys Security Advisory | https://www.seralys.com/research ====================================================================== Title: Authentication Bypass Product: Quest KACE Systems Management Appliance (SMA) Affected: Confirmed on 14.1 (older versions likely affected) Fixed in: 13.0.385, 13.1.81, 13.2.183, 14.0.341(Patch 5), 14.1.101(Patch 4) Vendor: Quest Software Discovered: April 2025 Severity:...
  • RansomLord (NG v1.0) anti-ransomware exploit tool June 24, 2025
    Posted by malvuln on Jun 23First official NG versioned release with significant updates, fixes and new features https://github.com/malvuln/RansomLord/releases/tag/v1.0 RansomLord (NG) v1.0 Anti-Ransomware exploit tool. Proof-of-concept tool that automates the creation of PE files, used to exploit ransomware pre-encryption. Lang: C SHA256: ACB0C4EEAB421761B6C6E70B0FA1D20CE08247525641A7CD03B33A6EE3D35D8A Deweaponize feature PoC video:...
  • Disclosure Yealink Cloud vulnerabilities June 24, 2025
    Posted by Jeroen Hermans via Fulldisclosure on Jun 23Dear all, ---Abstract--- Yealink RPS contains several vulnerabilities that can lead to leaking of PII and/or MITM attacks. Some vulnerabilities are unpatched even after disclosure to the manufacturer. ---/Abstract--- We are Stefan Gloor and Jeroen Hermans. We are independent computer security researchers working on a disclosure process […]
  • : "Glass Cage" – Zero-Click iMessage → Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885) June 18, 2025
    Posted by josephgoyd via Fulldisclosure on Jun 17"Glass Cage" – Sophisticated Zero-Click iMessage Exploit ChainEnabling Persistent iOS Compromise and Device Bricking CVE-2025-24085, CVE-2025-24201(CNVD-2025-07885) Author: Joseph Goydish II Date: 06/10/2025 Release Type: Full Disclosure Platform Affected: iOS 18.2 (confirmed zero-day at time of discovery) Delivery Vector: iMessage (default configuration) Impact: Remote Code Execution, Privilege Escalation, Keychain […]
  • SEC Consult SA-20250612-0 :: Reflected Cross-Site Scripting in ONLYOFFICE Docs (DocumentServer) June 18, 2025
    Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Jun 17SEC Consult Vulnerability Lab Security Advisory < 20250612-0 > ======================================================================= title: Reflected Cross-Site Scripting product: ONLYOFFICE Docs (DocumentServer) vulnerable version:
  • SEC Consult SA-20250611-0 :: Undocumented Root Shell Access on SIMCom SIM7600G Modem June 18, 2025
    Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Jun 17SEC Consult Vulnerability Lab Security Advisory < 20250611-0 > ======================================================================= title: Undocumented Root Shell Access product: SIMCom - SIM7600G Modem vulnerable version: Firmware Revision: LE20B03SIM7600M21-A fixed version: - CVE number: CVE-2025-26412 impact: Medium homepage: https://www.simcom.com...
  • Call for Applications: ERCIM STM WG 2025 Award for the Best Ph.D. Thesis on Security and Trust Management (July 31, 2025) June 18, 2025
    Posted by 0610648533 on Jun 17======================================================================== CALL FOR APPLICATIONS ERCIM STM WG 2025 Award for the Best Ph.D. Thesis on Security and Trust Management ======================================================================== The European Research Consortium in Informatics and Mathematics (ERCIM) has a technical WG on Security and Trust Management (STM) for performing a series of activities, as research projects,...

Customers

Newsletter

{subscription_form_1}