<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>andre_o Tracker</title>
    <link>https://communities.vmware.com/wbsdv95928/tracker</link>
    <description>andre_o Tracker</description>
    <pubDate>Sat, 18 Nov 2023 03:43:51 GMT</pubDate>
    <dc:date>2023-11-18T03:43:51Z</dc:date>
    <item>
      <title>Security vulnerabilities in 3rd party packages shipped with VDDK Linux 7.0.3.2</title>
      <link>https://communities.vmware.com/t5/Virtual-Disk-Development-Kit/Security-vulnerabilities-in-3rd-party-packages-shipped-with-VDDK/m-p/2959210#M2379</link>
      <description>&lt;P&gt;&lt;SPAN&gt;VDDK&lt;/SPAN&gt;&amp;nbsp;version 7.0.3.2 includes few third party packages which have known&amp;nbsp;&lt;SPAN&gt;security&lt;/SPAN&gt; vulnerabilities:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;zlib-1.2.12 (&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434" target="_blank" rel="noopener"&gt;https://nvd.nist.gov/vuln/detail/CVE-2022-37434&lt;/A&gt;)&lt;/LI&gt;&lt;LI&gt;OpenSSL-1.0.2ze (&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068" target="_blank" rel="noopener"&gt;https://nvd.nist.gov/vuln/detail/CVE-2022-2068&lt;/A&gt;)&lt;/LI&gt;&lt;LI&gt;curl-7.76.1 (&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-22901" target="_blank" rel="noopener"&gt;https://nvd.nist.gov/vuln/detail/CVE-2021-22901&lt;/A&gt;, &lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898" target="_blank" rel="noopener"&gt;&lt;BR /&gt;https://nvd.nist.gov/vuln/detail/CVE-2021-22898&lt;/A&gt;, &lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-22897" target="_blank" rel="noopener"&gt;https://nvd.nist.gov/vuln/detail/CVE-2021-22897&lt;/A&gt;)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could someone please share some details on whether the above-states vulnerabilities are affecting (and/or can be exploited via) the &lt;SPAN&gt;VDDK? If so, we would kindly request a&amp;nbsp;7.0.3.X VDDK update&lt;/SPAN&gt;&amp;nbsp;with those third party packages upgraded to patched version.&lt;/P&gt;&lt;P&gt;If VDDK is not affected, it would be great to have some details why/how&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot!&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 04:53:24 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Virtual-Disk-Development-Kit/Security-vulnerabilities-in-3rd-party-packages-shipped-with-VDDK/m-p/2959210#M2379</guid>
      <dc:creator>andre_o</dc:creator>
      <dc:date>2023-03-15T04:53:24Z</dc:date>
    </item>
  </channel>
</rss>

