Component | CVE |
---|---|
apr-util | CVE-2022-25147 |
ch.qos.logback:logback-core | CVE-2023-6378 |
CVE-2023-6481 | |
chromium | CVE-2023-3727 |
CVE-2023-4072 | |
CVE-2023-4073 | |
CVE-2023-4076 | |
CVE-2023-4353 | |
CVE-2023-4354 | |
CVE-2023-4427 | |
CVE-2023-4428 | |
CVE-2023-4429 | |
CVE-2023-4430 | |
CVE-2023-4431 | |
CVE-2023-4572 | |
CVE-2023-45853 | |
CVE-2023-4761 | |
CVE-2023-4762 | |
CVE-2023-4763 | |
CVE-2023-4764 | |
CVE-2023-4863 | |
CVE-2023-4900 | |
CVE-2023-4901 | |
CVE-2023-4902 | |
CVE-2023-4903 | |
CVE-2023-4904 | |
CVE-2023-4905 | |
CVE-2023-4906 | |
CVE-2023-4907 | |
CVE-2023-4908 | |
CVE-2023-4909 | |
CVE-2023-5186 | |
CVE-2023-5187 | |
CVE-2023-5217 | |
CVE-2023-5218 | |
CVE-2023-5346 | |
CVE-2023-5472 | |
CVE-2023-5473 | |
CVE-2023-5474 | |
CVE-2023-5475 | |
CVE-2023-5476 | |
CVE-2023-5477 | |
CVE-2023-5478 | |
CVE-2023-5479 | |
CVE-2023-5480 | |
CVE-2023-5481 | |
CVE-2023-5482 | |
CVE-2023-5483 | |
CVE-2023-5484 | |
CVE-2023-5485 | |
CVE-2023-5486 | |
CVE-2023-5487 | |
CVE-2023-5849 | |
CVE-2023-5850 | |
CVE-2023-5851 | |
CVE-2023-5852 | |
CVE-2023-5853 | |
CVE-2023-5854 | |
CVE-2023-5855 | |
CVE-2023-5856 | |
CVE-2023-5857 | |
CVE-2023-5858 | |
CVE-2023-5859 | |
CVE-2023-5996 | |
CVE-2023-5997 | |
CVE-2023-6112 | |
CVE-2023-6346 | |
CVE-2023-6348 | |
CVE-2023-6512 | |
golang-runtime | CVE-2023-45287 |
io.netty:netty-common | CVE-2023-34462 |
libwebp | CVE-2023-4863 |
linux_kernel | CVE-2023-45863 |
CVE-2023-46813 | |
CVE-2023-5178 | |
CVE-2023-5717 | |
CVE-2023-6610 | |
log4j:log4j | CVE-2019-17571 |
CVE-2020-9493 | |
CVE-2022-23302 | |
CVE-2022-23305 | |
CVE-2022-23307 | |
CVE-2023-26464 | |
org.apache.poi:poi | CVE-2022-26336 |
org.apache.struts:struts2-core | CVE-2023-34149 |
CVE-2023-34396 | |
CVE-2023-41835 | |
CVE-2023-50164 Not Exploitable * | |
org.apache.tiles:tiles-core | CVE-2009-1275 |
CVE-2023-49735 | |
org.apache.tomcat:tomcat-util | CVE-2023-42794 |
org.json:json | CVE-2023-5072 |
org.springframework:spring-core | CVE-2023-20861 |
perl | CVE-2023-47100 |
postgresql | CVE-2020-21469 |
CVE-2023-39417 | |
CVE-2023-39418 | |
CVE-2023-5868 | |
CVE-2023-5869 | |
CVE-2023-5870 | |
vim | CVE-2023-46246 |
CVE-2023-48231 | |
CVE-2023-48232 | |
CVE-2023-48233 | |
CVE-2023-48234 | |
CVE-2023-48235 | |
CVE-2023-48236 | |
CVE-2023-48237 | |
CVE-2023-48706 |
VMware Aria Operations 8.14 Hot Fix 1 can be applied to any 8.14.x environment.
Note: Upgrading from older versions directly to this Hot Fix is not supported. You must upgrade to 8.14.x before applying this Hot Fix.
Important: Take snapshots of each of the VMware Aria Operations nodes before applying the Hot Fix by following How to take a Snapshot of VMware Aria Operations.
Release Name | Release Date | Build Number | UI Build Number | File Name |
VMware-Aria-Operations-8.14-HF1 | 1/11/2024 | 23069783 | 23069790 | vRealize_Operations_Manager_With_CP-8.10.x-to-8.14.1.23069783.pak |
Once the update is complete delete the snapshots you made before the software update.