This patch (CSP-99024) has been superseded and is no longer available. Please install the latest cumulative update, CSP-102092, by following the instructions in KB 412021.
This article provides information on a previous patch (CSP-99024) that upgraded Photon OS libraries to fix the security vulnerabilities listed below.
CVE-2023-0054, CVE-2022-2819, CVE-2022-2946, CVE-2022-2264, CVE-2022-2286, CVE-2022-2287, CVE-2022-2289, CVE-2022-2304, CVE-2022-2343, CVE-2022-2345, CVE-2022-2580, CVE-2022-2581, CVE-2022-2849, CVE-2022-2980, CVE-2022-3016, CVE-2022-3037, CVE-2022-3234, CVE-2022-3235, CVE-2022-3296, CVE-2022-3297, CVE-2022-3705, CVE-2022-4293, CVE-2023-1170, CVE-2023-1175, CVE-2023-1264, CVE-2023-2609, CVE-2023-4735, CVE-2023-4738, CVE-2023-4750, CVE-2023-4752, CVE-2023-5344, CVE-2023-46246, CVE-2023-48231, CVE-2023-48233, CVE-2023-48235, CVE-2023-48706, CVE-2022-47024, CVE-2023-0049, CVE-2023-0051, CVE-2023-0433, CVE-2022-3324, CVE-2022-3520, CVE-2022-3591, CVE-2022-4292, CVE-2022-2288, CVE-2022-3256, CVE-2022-3278, CVE-2023-2610, CVE-2023-4734, CVE-2023-4751, CVE-2023-4733, CVE-2023-4781, CVE-2023-5441, CVE-2023-5535, CVE-2023-48234, CVE-2023-48236, CVE-2022-2257, CVE-2022-2284, CVE-2022-2285, CVE-2022-2344, CVE-2022-2522, CVE-2022-2571, CVE-2022-2598, CVE-2022-2816, CVE-2022-2817, CVE-2022-2845, CVE-2022-2862, CVE-2022-2874, CVE-2022-2889, CVE-2022-2923, CVE-2022-2982, CVE-2022-3099, CVE-2022-3134, CVE-2022-3153, CVE-2022-3352, CVE-2022-3491, CVE-2022-4141, CVE-2023-48237, CVE-2024-28085, CVE-2023-39804, CVE-2022-40897, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067, CVE-2022-48564, CVE-2020-10735, CVE-2022-37454, CVE-2023-24329, CVE-2022-48560, CVE-2022-48565, CVE-2022-48566, CVE-2023-40217, CVE-2023-6597, CVE-2022-4304, CVE-2022-4450, CVE-2023-0286, CVE-2023-0464, CVE-2023-2650, CVE-2023-0215, CVE-2020-11080, CVE-2020-24370, CVE-2021-44647, CVE-2023-23454, CVE-2023-23559, CVE-2023-1076, CVE-2023-3212, CVE-2023-3776, CVE-2023-40283, CVE-2023-31085, CVE-2023-52620, CVE-2024-26642, CVE-2024-42284, CVE-2024-42301, CVE-2024-43858, CVE-2024-44998, CVE-2024-44999, CVE-2024-46673, CVE-2022-3303, CVE-2023-28466, CVE-2023-35001, CVE-2023-5717, CVE-2024-36971, CVE-2024-42154, CVE-2024-42224, CVE-2024-42271, CVE-2024-42285, CVE-2024-44987, CVE-2024-46674, CVE-2022-3424, CVE-2022-3628, CVE-2022-36280, CVE-2022-41218, CVE-2022-45934, CVE-2022-47929, CVE-2023-0266, CVE-2023-0394, CVE-2023-0458, CVE-2023-0461, CVE-2023-23455, CVE-2023-28328, CVE-2021-44879, CVE-2022-0480, CVE-2022-3061, CVE-2023-1073, CVE-2023-1074, CVE-2023-1077, CVE-2022-20166, CVE-2023-1206, CVE-2023-2007, CVE-2023-3390, CVE-2023-3609, CVE-2023-3611, CVE-2024-0607, CVE-2024-1086, CVE-2024-38538, CVE-2024-38588, CVE-2024-46722, CVE-2024-46723, CVE-2024-46738, CVE-2024-46743, CVE-2024-46747, CVE-2024-46800, CVE-2023-29469, CVE-2for 3-45322, CVE-2024-25062, CVE-2024-34459, CVE-2023-29499, CVE-2023-32611, CVE-2023-32636, CVE-2023-32643, CVE-2024-33601, CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33602, CVE-2023-32665, CVE-2023-0361, CVE-2024-0553, CVE-2024-0567, CVE-2019-6470, CVE-2021-33294, CVE-2023-38545, CVE-2023-38039, CVE-2024-9681, CVE-2023-1786
VMware Identity Manager 3.3.x
Snapshots/Backups: It is strongly recommended to take a snapshot or backup of the appliance(s) and the database server before proceeding.
grub2.
grub.cfg file is present.
ls -ltr /boot/grub
# OR
ls -ltr /boot/grub2
grub.cfg file is missing or if your version is below 2.0, you must update GRUB before applying the patch. If you are unsure how to update the grub file, please contact Broadcom Support for assistance.sshuser and elevate to the root user with sudo su -.CSP-99024-Appliance-3.3.7.zip file to a temporary location on the appliance (e.g., /data).unzip CSP-99024-Appliance-3.3.7.zip -d CSP-99024-Appliance-3.3.7
cd CSP-99024-Appliance-3.3.7
./CSP-99024-applyPatch.sh
Note: For a clustered deployment, repeat the steps above on all additional nodes sequentially (Primary → Secondary → Secondary).
After the patch deployment, perform the following steps to confirm it was applied successfully:
ls /usr/local/horizon/conf/flags/CSP-99024-3.3.7.0-hotfix.applied
https://<vidm-hostname>:8443.To revert this patch, restore the appliance(s) and database from the snapshots and backups taken during the prerequisite phase.
During the installation of this patch, you may encounter the following issue: During the Patch installation to address CSP-99024 the installation gets stuck at "Updating RPM" with VMware Identity Manager Node