This patch (CSP-97727) has been superseded and is no longer available. Please install the latest cumulative update, CSP-102092, by following the instructions in KB 412021.
This article provides information on a previous patch that upgraded Photon OS libraries to fix the security vulnerabilities listed below.
CVE-2024-36971, CVE-2023-31130, CVE-2023-32067, CVE-2023-31147, CVE-2023-20867, CVE-2023-48795, CVE-2023-51384, CVE-2023-51385, CVE-2019-18276, CVE-2023-31486, CVE-2023-2953, CVE-2023-31124, CVE-2023-38039, CVE-2023-34058, CVE-2023-34059, CVE-2023-29499, CVE-2023-32611, CVE-2023-32636, CVE-2023-32643, CVE-2023-32665, CVE-2023-7104, CVE-2023-42465, CVE-2023-4408, CVE-2023-50387, CVE-2023-50868, CVE-2023-5517, CVE-2023-5679, CVE-2023-6516, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-0743, CVE-2024-38428, CVE-2024-34459, CVE-2024-37370, CVE-2024-37371, CVE-2024-44987, CVE-2024-44998, CVE-2024-44999, CVE-2024-46673, CVE-2024-46674, CVE-2023-6597, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2022-45934, CVE-2024-1086, CVE-2024-0607, CVE-2022-41218, CVE-2022-3628, CVE-2023-0458, CVE-2022-36280, CVE-2022-3424, CVE-2023-0266, CVE-2023-28328, CVE-2022-47929, CVE-2023-0394, CVE-2023-23455, CVE-2023-0461, CVE-2023-2952, CVE-2019-17026, CVE-2020-15656, CVE-2021-29984
VMware Identity Manager 3.3.x
Snapshots/Backups: It is strongly recommended to take a snapshot or backup of the appliance(s) before proceeding.
grub2.
ls -ltr /boot/grub
# OR
ls -ltr /boot/grub2
grub.cfg file. If it is missing or your grub version is below 2.0, you must update it before applying this patch. If you are unsure how to update the grub file, please contact Broadcom Support for assistance.Note: This is a cumulative patch and will also install fixes from several previous patches, including CSP-96928, CSP-95247, and others.
sshuser and elevate to the root user with sudo su -.CSP-97727-Appliance-3.3.7.zip file to a temporary location on the virtual appliance (e.g., /tmp).unzip CSP-97727-Appliance-3.3.7.zip -d CSP-97727-Appliance-3.3.7
cd CSP-97727-Appliance-3.3.7
./CSP-97727-applyPatch.sh
Note: For a clustered deployment, repeat the steps above on all additional nodes of the cluster sequentially (Primary → Secondary → Secondary).
After the patch deployment, perform the following steps to confirm it was applied successfully:
/usr/local/horizon/conf/flags directory:
ls /usr/local/horizon/conf/flags/CSP-97727-3.3.7-hotfix.applied
https://<vidm-hostname>:8443.To revert this patch, restore the appliance(s) and database from the snapshots and backups taken during the prerequisite phase.