CSP-99024: Patch instructions to upgrade Photon-OS Libraries
search cancel

CSP-99024: Patch instructions to upgrade Photon-OS Libraries

book

Article ID: 387748

calendar_today

Updated On:

Products

VMware Aria Suite

Issue/Introduction

Patch Superseded

This patch (CSP-99024) has been superseded and is no longer available. Please install the latest cumulative update, CSP-102092, by following the instructions in KB 412021.

Vulnerabilities Addressed by This (Superseded) Patch

This article provides information on a previous patch (CSP-99024) that upgraded Photon OS libraries to fix the security vulnerabilities listed below.


Affected Product

  • VMware Identity Manager Appliance: 3.3.7

Applicable CVEs

CVE-2023-0054, CVE-2022-2819, CVE-2022-2946, CVE-2022-2264, CVE-2022-2286, CVE-2022-2287, CVE-2022-2289, CVE-2022-2304, CVE-2022-2343, CVE-2022-2345, CVE-2022-2580, CVE-2022-2581, CVE-2022-2849, CVE-2022-2980, CVE-2022-3016, CVE-2022-3037, CVE-2022-3234, CVE-2022-3235, CVE-2022-3296, CVE-2022-3297, CVE-2022-3705, CVE-2022-4293, CVE-2023-1170, CVE-2023-1175, CVE-2023-1264, CVE-2023-2609, CVE-2023-4735, CVE-2023-4738, CVE-2023-4750, CVE-2023-4752, CVE-2023-5344, CVE-2023-46246, CVE-2023-48231, CVE-2023-48233, CVE-2023-48235, CVE-2023-48706, CVE-2022-47024, CVE-2023-0049, CVE-2023-0051, CVE-2023-0433, CVE-2022-3324, CVE-2022-3520, CVE-2022-3591, CVE-2022-4292, CVE-2022-2288, CVE-2022-3256, CVE-2022-3278, CVE-2023-2610, CVE-2023-4734, CVE-2023-4751, CVE-2023-4733, CVE-2023-4781, CVE-2023-5441, CVE-2023-5535, CVE-2023-48234, CVE-2023-48236, CVE-2022-2257, CVE-2022-2284, CVE-2022-2285, CVE-2022-2344, CVE-2022-2522, CVE-2022-2571, CVE-2022-2598, CVE-2022-2816, CVE-2022-2817, CVE-2022-2845, CVE-2022-2862, CVE-2022-2874, CVE-2022-2889, CVE-2022-2923, CVE-2022-2982, CVE-2022-3099, CVE-2022-3134, CVE-2022-3153, CVE-2022-3352, CVE-2022-3491, CVE-2022-4141, CVE-2023-48237, CVE-2024-28085, CVE-2023-39804, CVE-2022-40897, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067, CVE-2022-48564, CVE-2020-10735, CVE-2022-37454, CVE-2023-24329, CVE-2022-48560, CVE-2022-48565, CVE-2022-48566, CVE-2023-40217, CVE-2023-6597, CVE-2022-4304, CVE-2022-4450, CVE-2023-0286, CVE-2023-0464, CVE-2023-2650, CVE-2023-0215, CVE-2020-11080, CVE-2020-24370, CVE-2021-44647, CVE-2023-23454, CVE-2023-23559, CVE-2023-1076, CVE-2023-3212, CVE-2023-3776, CVE-2023-40283, CVE-2023-31085, CVE-2023-52620, CVE-2024-26642, CVE-2024-42284, CVE-2024-42301, CVE-2024-43858, CVE-2024-44998, CVE-2024-44999, CVE-2024-46673, CVE-2022-3303, CVE-2023-28466, CVE-2023-35001, CVE-2023-5717, CVE-2024-36971, CVE-2024-42154, CVE-2024-42224, CVE-2024-42271, CVE-2024-42285, CVE-2024-44987, CVE-2024-46674, CVE-2022-3424, CVE-2022-3628, CVE-2022-36280, CVE-2022-41218, CVE-2022-45934, CVE-2022-47929, CVE-2023-0266, CVE-2023-0394, CVE-2023-0458, CVE-2023-0461, CVE-2023-23455, CVE-2023-28328, CVE-2021-44879, CVE-2022-0480, CVE-2022-3061, CVE-2023-1073, CVE-2023-1074, CVE-2023-1077, CVE-2022-20166, CVE-2023-1206, CVE-2023-2007, CVE-2023-3390, CVE-2023-3609, CVE-2023-3611, CVE-2024-0607, CVE-2024-1086, CVE-2024-38538, CVE-2024-38588, CVE-2024-46722, CVE-2024-46723, CVE-2024-46738, CVE-2024-46743, CVE-2024-46747, CVE-2024-46800, CVE-2023-29469, CVE-2for 3-45322, CVE-2024-25062, CVE-2024-34459, CVE-2023-29499, CVE-2023-32611, CVE-2023-32636, CVE-2023-32643, CVE-2024-33601, CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33602, CVE-2023-32665, CVE-2023-0361, CVE-2024-0553, CVE-2024-0567, CVE-2019-6470, CVE-2021-33294, CVE-2023-38545, CVE-2023-38039, CVE-2024-9681, CVE-2023-1786

Environment

VMware Identity Manager 3.3.x

Resolution

Prerequisites (for Superseded Patch CSP-99024)

  • Version Support: It is recommended to upgrade unsupported versions of VMware Identity Manager to a supported version before patching. Please refer to the VMware Product Lifecycle Matrix for a list of supported versions.
  • Snapshots/Backups: It is strongly recommended to take a snapshot or backup of the appliance(s) and the database server before proceeding.

  • Disk Space: Ensure at least 16GB of free space is available in the installation file path.
  • GRUB Version Check: This patch is only compatible with grub2.
    1. Check for the GRUB configuration file by running one of the following commands. The output should show that a grub.cfg file is present.
      ls -ltr /boot/grub
      # OR
      ls -ltr /boot/grub2
    2. If the grub.cfg file is missing or if your version is below 2.0, you must update GRUB before applying the patch. If you are unsure how to update the grub file, please contact Broadcom Support for assistance.

Procedure (for Superseded Patch CSP-99024)

  1. Log in to the VMware Identity Manager appliance via SSH as sshuser and elevate to the root user with sudo su -.
  2. Download and transfer the CSP-99024-Appliance-3.3.7.zip file to a temporary location on the appliance (e.g., /data).
  3. Unzip the file into a new directory:
    unzip CSP-99024-Appliance-3.3.7.zip -d CSP-99024-Appliance-3.3.7
  4. Navigate into the new directory:
    cd CSP-99024-Appliance-3.3.7
  5. Run the patch script:
    ./CSP-99024-applyPatch.sh

Note: For a clustered deployment, repeat the steps above on all additional nodes sequentially (Primary → Secondary → Secondary).


Validation (for Superseded Patch CSP-99024)

After the patch deployment, perform the following steps to confirm it was applied successfully:

  1. Log in to the VMware Identity Manager Console and verify the System Diagnostics page shows a green status.
  2. Verify that the patch flag file has been created:
    ls /usr/local/horizon/conf/flags/CSP-99024-3.3.7.0-hotfix.applied
  3. Verify Legacy Connector functionality by ensuring the Auth Adapters load and open without errors.
  4. Perform a Directory Sync and confirm that users and groups are synchronized correctly.
  5. Check that all UI portal tabs load properly, including the configuration page at https://<vidm-hostname>:8443.

Rollback Procedure

To revert this patch, restore the appliance(s) and database from the snapshots and backups taken during the prerequisite phase.

Additional Information