Piergiorgio Venuti

Updates IaaS Infrastructure – version 5.0

New IaaS Architecture was released February 3th!

The following section list all the features, improvements, and fixed included in IaaS Service  5.0 release:

Type Summary
Improvement Now Redis is used to lock LVM operations.
Improvement RHEL/CentOS 5.x Ruby packages compiled with OpenSSL 1.0.1e.
Improvement Erlang upgraded to 18.3 version.
Improvement Improved reliability and cloud engine.
Fix Fixed the issue when after editing a swap disk that had been manually added (built or attached), the disk was removed from fstab and wasn’t available anymore.
Fix Fixed the issue when Virtual Servers built on vCloud compute resources were shut down after increasing the disk size.
Fix Fixed the problem when under certain conditions the vCloud user group created from GUI got duplicated. This led to duplicated resource pools and general misconfiguration of vCloud.
Fix Fixed the problem when in multi-vCenter environment the stats have not been collected from one of vCenter instances.
Fix Fixed the issue with inserting media to vCloud Director VS.
Fix Fixed the synchronization problem when deleting a media file from the catalog in vCloud Director was not updated in SOD CP.
Fix Fixed the issue when vCloud console did not show the correct size for Windows VSs.
Fix Fixed the problem when password became out of sync in vCloud Director after an admin had been editing a user profile and left the password blank.
Fix Fixed the problem when it was impossible to upload an ISO when the image extension was with capital ISO letters.
Fix Fixed moving Firewall Rules down
Fix Fixed the problem when Windows VS build failed if owner’s name contained incompatible character encodings: ASCII-8BIT and UTF-8
Fix Fixed a range of minor bugs related to VPN IPsec of vCloud Director integration.
Fix Fixed the problem when it was impossible to build a VS from ISO with operating system Windows.
Fix Fixed the error which occurred for a backup’s transaction log item.
Fix Fixed the broken autoscaling for load balancer clusters (autoscaling type) .

 

Share


RSS

More Articles…

Categories …

Tags

RSS Dark Reading:

RSS Full Disclosure

  • Backdoor.Win32.Delf.zho / Authentication Bypass RCE May 14, 2021
    Posted by malvuln on May 13Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/6b9f5a0512af3ab33c26eaa4bdf94f1f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Delf.zho Vulnerability: Authentication Bypass RCE Description: The malware listens on TCP port 21 and TCP ports 14920 to 14923. Third-party attackers who can reach the system can logon using any username/password […]
  • [CFP]: 2nd Joint Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2021) May 14, 2021
    Posted by Call For Papers CPSIOTSEC21 on May 13--------------------------------------------------------------------------------------------------------------- C a l l F o r P a p e r s 2nd Joint Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2021) Seoul, South Korea, November 15 (Monday), 2021 URL: https://cpsiotsec.github.io co-located with the ACM Conference on Computer and Communications Security (ACM CCS 2021)...
  • Trovent Security Advisory 2103-02 / Multiple XSS vulnerabilities in ERPNext 13.0.0/12.18.0 May 11, 2021
    Posted by Stefan Pietsch on May 11# Trovent Security Advisory 2103-02 # ##################################### Multiple XSS vulnerabilities in ERPNext 13.0.0/12.18.0 ###################################################### Overview ######## Advisory ID: TRSA-2103-02 Advisory version: 1.0 Advisory status: Public Advisory URL: https://trovent.io/security-advisory-2103-02 Affected product: ERPNext Tested versions: 12.18.0 and 13.0.0 beta Vendor: Frappé Technologies...
  • Trovent Security Advisory 2103-01 / Authenticated SQL injection in ERPNext 13.0.0/12.18.0 May 11, 2021
    Posted by Stefan Pietsch on May 11# Trovent Security Advisory 2103-01 # ##################################### Authenticated SQL injection in ERPNext 13.0.0/12.18.0 ##################################################### Overview ######## Advisory ID: TRSA-2103-01 Advisory version: 1.0 Advisory status: Public Advisory URL: https://trovent.io/security-advisory-2103-01 Affected product: ERPNext Tested versions: 12.18.0 and 13.0.0 beta Vendor: Frappé Technologies https://frappe.io...
  • CVE-2021-32051 Hexagon G!nius Auskunftsportal before 5.0.0.0 allows SQL injection via the GiPWorkflow/Service/DownloadPublicFile id parameter. May 11, 2021
    Posted by Marcel Keiffenheim on May 11
  • Backdoor.Win32.Antilam.13.a / Unauthenticated Remote Command Execution May 11, 2021
    Posted by malvuln on May 11Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/1ef711b34cc278449f1997e4ed06334a.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Antilam.13.a Vulnerability: Unauthenticated Remote Command Execution Description: The malware drops an executable named "scandisk.exe" that listens on TCP ports 47891 and 29559. Third party attackers who can reach infected...
  • Backdoor.Win32.MotivFTP.12 / Authentication Bypass RCE May 11, 2021
    Posted by malvuln on May 11Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/88785a093b8fa00893214dd220ac255d.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.MotivFTP.12 Vulnerability: Authentication Bypass RCE Description: The malware listens on TCP port 21. Third-party attackers who can reach the system can logon using any username/password combination. Attackers may then upload...
  • Re: Three vulnerabilities found in MikroTik's RouterOS May 11, 2021
    Posted by Gynvael Coldwind on May 11Got it! Thank you for the explanation!
  • Four vulnerabilities found in MikroTik's RouterOS May 11, 2021
    Posted by Q C on May 11Advisory: four vulnerabilities found in MikroTik's RouterOS Details ======= Product: MikroTik's RouterOS Vendor URL: https://mikrotik.com/ Vendor Status: only CVE-2020-20227 is fixed CVE: CVE-2020-20220, CVE-2020-20227, CVE-2020-20245, CVE-2020-20246 Credit: Qian Chen(@cq674350529) of Qihoo 360 Nirvan Team Product Description ================== RouterOS is the operating system used on the MikroTik's devices, such as […]
  • Re: Three vulnerabilities found in MikroTik's RouterOS May 11, 2021
    Posted by Q C on May 11Hi, In Mikrotik RouterOs, each user is assigned to a user group, which denotes the rights of this user. A group policy is a combination of individual policy items, and provides a convenient way to assign different permissions and access rights to different user classes. (Reference: https://help.mikrotik.com/docs/display/ROS/User) Some common […]

Customers

Newsletter