hachyderm.io is one of the many independent Mastodon servers you can use to participate in the fediverse.
Hachyderm is a safe space, LGBTQIA+ and BLM, primarily comprised of tech industry professionals world wide. Note that many non-user account types have restrictions - please see our About page.

Administered by:

Server stats:

9.2K
active users

#vCenter

0 posts0 participants0 posts today

Интеграция Jira-AWX

Всем привет, меня зовут Денис, я хотел бы поделиться опытом использования AWX в рамках одной из наших потребностей. Статья может быть полезна ребятам с «инфры», если в компании используется vmware и подобное cloud решение для частого деплоя, а для всяческой бюрократии и запросов вы обращайтесь в Jira. Недавно @kuksepa выкладывала отличную статью про AWX по этому я не стану много описывать конкретно его, а постараюсь кратко описать процесс. Прошу не обращать внимание на замазанные элементы.

habr.com/ru/articles/876934/

ХабрИнтеграция Jira-AWX"Деплой" виртуальных машин путем "тикета" в Jira Всем привет, меня зовут Денис, я хотел бы поделиться опытом использования AWX в рамках одной из наших потребностей. Статья может быть полезна ребятам с...
Continued thread

🛑 MAJ 22 octobre 2024 :

#Broadcom a annoncé que les correctifs #VMware #vCenter publiés le 17 sept. 2024 ne couvraient pas complètement la vulnérabilité CVE-2024-38812. Il est important pour tous les clients d’appliquer les derniers correctifs disponibles dans la matrice de réponse. Les patches pour la version 8.0 U2 sont également disponibles.

Produits impactés :

  • vCenter Server 8.0
  • vCenter Server 7.0
  • VMware Cloud Foundation 5.x
  • VMware Cloud Foundation 4.x

👇
support.broadcom.com/web/ecx/s

#Cyberveille #CVE_2024_38812
#Patch

Support PortalSupport Content Notification - Support Portal - Broadcom support portal

VMware ESXi, Workstation, Fusion, and vCenter Server Security Vulnerabilities

Date: 2024-05-21

CVE: CVE-2024-22273, CVE-2024-22274, CVE-2024-22275

Vulnerability Type: Out-of-bounds read/write, Authenticated remote-code execution, Partial file read

CWE: [[CWE-125]], [[CWE-306]], [[CWE-200]]

Sources: Broadcom Security Advisory

Issue Summary

Multiple security vulnerabilities have been identified in VMware ESXi, Workstation, Fusion, and vCenter Server. These include an out-of-bounds read/write flaw, an authenticated remote code execution issue, and a partial file read vulnerability. The issues were privately reported to VMware and updates are now available to address them.

Technical Key findings

  • CVE-2024-22273 (8.1 high) out-of-bounds read/write - Involves an out-of-bounds read/write vulnerability in the storage controllers of VMware products, which can be exploited to cause denial of service or execute code. A malicious actor needs access to a virtual machine with storage controllers enabled.

  • CVE-2024-22274 (7.2 high) VMware vCenter Server authenticated remote-code execution - Allows a malicious actor with administrative privileges on the vCenter appliance shell to execute remote code on vCenter Server

  • CVE-2024-22275 (4.9 medium) VMware vCenter Server partial file read - Permits partial file read, potentially exposing sensitive data.

Vulnerable products

  • VMware ESXi (versions 7.0, 8.0)
  • VMware vCenter Server (versions 7.0, 8.0)
  • VMware Cloud Foundation (versions 4.x, 5.x)
  • VMware Workstation Pro/Player (version 17.x)
  • VMware Fusion (version 13.x)

Impact assessment

Exploitation of these vulnerabilities can lead to denial of service, unauthorized code execution, and exposure of sensitive information, significantly impacting system security and integrity.

Patches or workaround

VMware has released patches to address these vulnerabilities. No workarounds are available.

| | | | | | | | | |
| ------------------ | ----------- | -------------- | ------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------ | ----------------------------------------------------------------------------------------------------------------- | --------------- | ---------------------------- |
| VMware Product | Version | Running On | CVE | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
| vCenter Server | 8.0 | Any | CVE-2024-22274, CVE-2024-22275 | 7.24.9 | Important | 8.0 U2b | None | None |
| vCenter Server | 7.0 | Any | CVE-2024-22274, CVE-2024-22275 | 7.24.9 | Important | 7.0 U3q | None | None |

** Impacted Product Suites that Deploy Response Matrix 3b and 3c Components:*

| VMware Product | Version | Running On | CVE | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
| --------------------------------- | ----------- | -------------- | ------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------ | ------------------------------------------------------------------------------------------------------------------------- | --------------- | ------------------------------------------------------------------------- |
| Cloud Foundation (vCenter Server) | 5.x | Any | CVE-2024-22274, CVE-2024-22275 | 7.24.9 | Important | 5.1.1 | None | KB88287 |
| Cloud Foundation (vCenter Server) | 4.x | Any | CVE-2024-22274, CVE-2024-22275 | 7.24.9 | Important | KB88287 | None | None |

Tags

#VMware #CVE-2024-22273 #CVE-2024-22274 #CVE-2024-22275 #vCenter #ESXi #Workstation #Fusion #Security #Patches

Support PortalSupport Content Notification - Support Portal - Broadcom support portal

Hey #vmware folks,
I have a VM that got messed up when I deleted all snapshots.

From what i understand i'm missing the 02 file.

Do i really have to revert to the beginning?

The VM is running fine-- i tried vmotion to a new data store, didn't work. I don't see any snapshots I can delete.

This happened when i tried to delete all snapshots and it failed.