This is an automated email from the ASF dual-hosted git repository.

DaanHoogland pushed a commit to branch sec-22.0.1
in repository https://gitbox.apache.org/repos/asf/cloudstack-www.git

commit f31c2db5f6fc267805675d00f5385261d598ba82
Author: Daan Hoogland <[email protected]>
AuthorDate: Tue May 5 19:57:13 2026 +0200

    security release 20.3 and 22.0.1 announcement
---
 .../banner.png                                     | Bin 0 -> 607110 bytes
 .../index.md                                       | 157 +++++++++++++++++++++
 2 files changed, 157 insertions(+)

diff --git 
a/blog/2026-05-05-security-release-advisory-4.20.3.0-4.22.0.1/banner.png 
b/blog/2026-05-05-security-release-advisory-4.20.3.0-4.22.0.1/banner.png
new file mode 100644
index 000000000..18345530e
Binary files /dev/null and 
b/blog/2026-05-05-security-release-advisory-4.20.3.0-4.22.0.1/banner.png differ
diff --git 
a/blog/2026-05-05-security-release-advisory-4.20.3.0-4.22.0.1/index.md 
b/blog/2026-05-05-security-release-advisory-4.20.3.0-4.22.0.1/index.md
new file mode 100644
index 000000000..fbca324b7
--- /dev/null
+++ b/blog/2026-05-05-security-release-advisory-4.20.3.0-4.22.0.1/index.md
@@ -0,0 +1,157 @@
+---
+layout: post
+title: "[ADVISORY] Apache CloudStack LTS Security Releases 4.20.3.0 and 
4.22.0.1"
+tags: [announcement]
+authors: [daan]
+slug: security-release-advisory-4.20.3.0-4.22.0.1
+---
+
+[![](banner.png "Apache CloudStack LTS Security Releases 4.20.3.0 and 
4.22.0.1")](/blog/security-release-advisory-4.20.3.0-4.22.0.1)
+
+The Apache CloudStack project announces the release of LTS releases 
[4.20.3.0](https://github.com/apache/cloudstack/releases/tag/4.20.3.0) and 
[4.22.0.1](https://github.com/apache/cloudstack/releases/tag/4.22.0.1) that 
address the following security issues:
+
+- CVE-2025-66170 (severity 'Low')
+- CVE-2025-66171 (severity 'Important')
+- CVE-2025-66172 (severity 'Important')
+- CVE-2025-66467 (severity 'Important')
+- CVE-2025-69233 (severity 'Moderate')
+- CVE-2026-25077 (severity 'Important')
+- CVE-2026-25199 (severity 'Moderate')
+
+
+<!-- truncate -->
+
+## [CVE-2025-66170](https://www.cve.org/CVERecord?id=CVE-2025-66170): Any user 
can list backups that they should not have access to.
+
+### Credits
+
+The CVEs are credited to the following reporters:
+
+- CVE-2025-66170:
+  - Fabricio Duarte <[email protected]> (reporter)
+  - Gabriel Ortiga Fernandes <[email protected]> (reporter)
+
+### Affected versions:
+
+- CVE-2025-66170:
+  - Apache CloudStack 4.21.0.0 through 4.22.0.0
+
+### Resolution
+
+Users are recommended to upgrade to version 4.22.0.1 or later, which addresses 
these issues.
+
+## [CVE-2025-66171](https://www.cve.org/CVERecord?id=CVE-2025-66171): Any user 
can create a new VM from backups they should not have access to
+
+### Credits
+
+The CVEs are credited to the following reporters:
+
+- CVE-2025-66171:
+  - Fabricio Duarte <[email protected]> (reporter)
+  - Gabriel Ortiga Fernandes <[email protected]> (reporter)
+
+### Affected versions:
+
+- CVE-2025-66171:
+  - Apache CloudStack 4.21.0.0 through 4.22.0.0
+
+### Resolution
+
+Users are recommended to upgrade to version 4.22.0.1 or later, which addresses 
these issues.
+
+## [CVE-2025-66172](https://www.cve.org/CVERecord?id=CVE-2025-66172): Any user 
can attach a volume in their VMs from backups they should not have access to
+
+### Credits
+
+The CVEs are credited to the following reporters:
+
+- CVE-2025-66172:
+  - Fabricio Duarte <[email protected]> (reporter)
+  - Gabriel Ortiga Fernandes <[email protected]> (reporter)
+
+### Affected versions:
+
+- CVE-2025-66170:
+  - Apache CloudStack 4.21.0.0 through 4.22.0.0
+
+### Resolution
+
+Users are recommended to upgrade to version 4.22.0.1 or later, which addresses 
these issues.
+
+## [CVE-2025-66467](https://www.cve.org/CVERecord?id=CVE-2025-66467): MinIO 
policy remains intact on bucket deletion
+
+### Credits
+
+The CVEs are credited to the following reporters:
+
+- CVE-2025-66467:
+  - Roman Kozello (reporter)
+
+### Affected versions:
+
+- CVE-2025-66467:
+  - Apache CloudStack 4.19.0.0 through 4.20.2.0
+  - Apache CloudStack 4.21.0.0 through 4.22.0.0
+
+### Resolution
+
+Users are recommended to upgrade to version 4.20.3.0 or 4.22.0.1 or later, 
which addresses these issues.
+
+
+## [CVE-2025-69233](https://www.cve.org/CVERecord?id=CVE-2025-69233): 
Domain/account resources limits not honored
+
+### Credits
+
+The CVEs are credited to the following reporters:
+
+- CVE-2025-69233:
+  - Fernando Oliveira (reporter)
+  - Gustavo Viana (reporter)
+
+### Affected versions:
+
+- CVE-2025-66467:
+  - Apache CloudStack 4.0.0 through 4.20.2.0
+  - Apache CloudStack 4.21.0.0 through 4.22.0.0
+
+### Resolution
+
+Users are recommended to upgrade to version 4.20.3.0 or 4.22.0.1 or later, 
which addresses these issues.
+
+
+## [CVE-2026-25199](https://www.cve.org/CVERecord?id=CVE-2026-25199): Proxmox 
Extension Allows Unauthorized Cross-Tenant Instance Access
+
+### Credits
+
+The CVEs are credited to the following reporters:
+
+- CVE-2026-25199:
+  - Sander Grendelman <[email protected]> (reporter)
+
+### Affected versions:
+
+- CVE-2026-25199:
+  - Apache CloudStack 4.21.0.0 through 4.22.0.0
+
+### Resolution
+
+Users are recommended to upgrade to version 4.22.0.1 or later, which addresses 
these issues.
+
+
+## Downloads and Documentation
+
+The official source code for the 4.22.0.1 release can be downloaded from the 
project downloads page:
+
+https://cloudstack.apache.org/downloads
+
+The 4.22.0.1 release notes can be found at:
+- https://docs.cloudstack.apache.org/en/4.22.0.1/releasenotes/about.html
+
+In addition to the official source code release, individual contributors have 
also made release packages available on the Apache CloudStack download page, 
and available at:
+
+- https://download.cloudstack.org/el/7/
+- https://download.cloudstack.org/el/8/
+- https://download.cloudstack.org/el/9/
+- https://download.cloudstack.org/suse/15/
+- https://download.cloudstack.org/ubuntu/dists/
+- https://www.shapeblue.com/cloudstack-packages/

Reply via email to