VMware Aria Operations for Logs 8.16.1
search cancel

VMware Aria Operations for Logs 8.16.1

book

Article ID: 368181

calendar_today

Updated On:

Products

VMware Aria Suite

Issue/Introduction

This article covers the fixes made in VMware Aria Operations for Logs 8.16.1 from previous versions.

NOTE: There are no new product features in this release. The main purpose of the release is to address security fixes.

 

The following CVEs have been resolved as of VMware Aria Operations for Logs 8.16.1

Component Name  CVE
Pillow CVE-2023-50447
CVE-2024-28219
bind CVE-2023-4408
CVE-2023-50387
CVE-2023-50868
CVE-2023-5517
CVE-2023-5679
CVE-2023-6516
c-ares CVE-2024-25629
ch.qos.logback:logback-core BDSA-2021-3401
CVE-2021-42550
CVE-2023-6378
curl CVE-2023-52071
fonttools CVE-2023-45139
giflib CVE-2023-48161
glibc CVE-2023-0687
CVE-2023-6246
CVE-2023-6779
CVE-2023-6780
CVE-2024-2961
gnutls CVE-2024-28834
CVE-2024-28835
go-jose CVE-2024-28180
jdk-liberica CVE-2024-20918
CVE-2024-20926
CVE-2024-20952
jvm-hotspot-openjdk CVE-2024-20919
CVE-2024-20921
CVE-2024-20945
less CVE-2022-48624
CVE-2024-32487
libtiff CVE-2023-3164
CVE-2023-40745
CVE-2023-41175
CVE-2023-52355
libuv CVE-2024-24806
libwebp CVE-2023-4863
linux-pam CVE-2024-22365
linux_kernel CVE-2022-48674
CVE-2023-28746
CVE-2023-46862
CVE-2023-50431
CVE-2023-51779
CVE-2023-52434
CVE-2023-52435
CVE-2023-52438
CVE-2023-52439
CVE-2023-52442
CVE-2023-52443
CVE-2023-52447
CVE-2023-52451
CVE-2023-52454
CVE-2023-52458
CVE-2023-52463
CVE-2023-52467
CVE-2023-52469
CVE-2023-52482
CVE-2023-52489
CVE-2023-52491
CVE-2023-52492
CVE-2023-52498
CVE-2023-52508
CVE-2023-52583
CVE-2023-52586
CVE-2023-52587
CVE-2023-52593
CVE-2023-52597
CVE-2023-52598
CVE-2023-52606
CVE-2023-52607
CVE-2023-52609
CVE-2023-52612
CVE-2023-52615
CVE-2023-52616
CVE-2023-52620
CVE-2023-52622
CVE-2023-52623
CVE-2023-52630
CVE-2023-52642
CVE-2023-52644
CVE-2023-52650
CVE-2023-52651
CVE-2023-52654
CVE-2023-52656
CVE-2023-52753
CVE-2023-52806
CVE-2023-52809
CVE-2023-52814
CVE-2023-52817
CVE-2023-52821
CVE-2023-6040
CVE-2023-6121
CVE-2023-6356
CVE-2023-6536
CVE-2023-6606
CVE-2023-6817
CVE-2023-6931
CVE-2023-6932
CVE-2023-7042
CVE-2024-0340
CVE-2024-0565
CVE-2024-0584
CVE-2024-0607
CVE-2024-0646
CVE-2024-0841
CVE-2024-1086
CVE-2024-1151
CVE-2024-1312
CVE-2024-2193
CVE-2024-22099
CVE-2024-23307
CVE-2024-23849
CVE-2024-23850
CVE-2024-24860
CVE-2024-25741
CVE-2024-25744
CVE-2024-26583
CVE-2024-26584
CVE-2024-26585
CVE-2024-26589
CVE-2024-26592
CVE-2024-26593
CVE-2024-26594
CVE-2024-26598
CVE-2024-26602
CVE-2024-26606
CVE-2024-26610
CVE-2024-26614
CVE-2024-26622
CVE-2024-26625
CVE-2024-26627
CVE-2024-26633
CVE-2024-26635
CVE-2024-26636
CVE-2024-26641
CVE-2024-26642
CVE-2024-26644
CVE-2024-26645
CVE-2024-26664
CVE-2024-26665
CVE-2024-26671
CVE-2024-26673
CVE-2024-26679
CVE-2024-26688
CVE-2024-26689
CVE-2024-26698
CVE-2024-26704
CVE-2024-26712
CVE-2024-26720
CVE-2024-26727
CVE-2024-26733
CVE-2024-26735
CVE-2024-26736
CVE-2024-26747
CVE-2024-26751
CVE-2024-26754
CVE-2024-26763
CVE-2024-26764
CVE-2024-26772
CVE-2024-26773
CVE-2024-26777
CVE-2024-26779
CVE-2024-26782
CVE-2024-26791
CVE-2024-26793
CVE-2024-26795
CVE-2024-26801
CVE-2024-26804
CVE-2024-26805
CVE-2024-26808
CVE-2024-26809
CVE-2024-26816
CVE-2024-26817
CVE-2024-26819
CVE-2024-26825
CVE-2024-26829
CVE-2024-26833
CVE-2024-26839
CVE-2024-26840
CVE-2024-26843
CVE-2024-26845
CVE-2024-26846
CVE-2024-26851
CVE-2024-26852
CVE-2024-26855
CVE-2024-26857
CVE-2024-26859
CVE-2024-26861
CVE-2024-26862
CVE-2024-26863
CVE-2024-26870
CVE-2024-26872
CVE-2024-26874
CVE-2024-26875
CVE-2024-26877
CVE-2024-26878
CVE-2024-26880
CVE-2024-26882
CVE-2024-26883
CVE-2024-26884
CVE-2024-26885
CVE-2024-26889
CVE-2024-26891
CVE-2024-26894
CVE-2024-26895
CVE-2024-26897
CVE-2024-26898
CVE-2024-26901
CVE-2024-26903
CVE-2024-26904
CVE-2024-26906
CVE-2024-26907
CVE-2024-26908
CVE-2024-26910
CVE-2024-26917
CVE-2024-26920
CVE-2024-26924
CVE-2024-26925
CVE-2024-26926
CVE-2024-26928
CVE-2024-26931
CVE-2024-26934
CVE-2024-26935
CVE-2024-26937
CVE-2024-26947
CVE-2024-26950
CVE-2024-26951
CVE-2024-26955
CVE-2024-26956
CVE-2024-26957
CVE-2024-26960
CVE-2024-26961
CVE-2024-26965
CVE-2024-26966
CVE-2024-26969
CVE-2024-26970
CVE-2024-26972
CVE-2024-26973
CVE-2024-26974
CVE-2024-26976
CVE-2024-26978
CVE-2024-26979
CVE-2024-27013
CVE-2024-27020
CVE-2024-27024
CVE-2024-27025
CVE-2024-27028
CVE-2024-27030
CVE-2024-27038
CVE-2024-27043
CVE-2024-27044
CVE-2024-27045
CVE-2024-27046
CVE-2024-27047
CVE-2024-27051
CVE-2024-27052
CVE-2024-27053
CVE-2024-27059
CVE-2024-27073
CVE-2024-27074
CVE-2024-27075
CVE-2024-27076
CVE-2024-27077
CVE-2024-27078
CVE-2024-27388
CVE-2024-27395
CVE-2024-27396
CVE-2024-35972
CVE-2024-35978
CVE-2024-35982
CVE-2024-35984
CVE-2024-35990
CVE-2024-35997
CVE-2024-36008
ncurses CVE-2020-19185
CVE-2020-19186
CVE-2020-19187
CVE-2020-19188
CVE-2020-19189
CVE-2020-19190
CVE-2022-29458
CVE-2023-29491
nss CVE-2023-0767
CVE-2023-5388
openssh CVE-2023-51384
procps CVE-2023-4016
runc CVE-2023-25809
CVE-2023-27561
CVE-2023-28642
CVE-2024-21626
sendmail CVE-2023-51765
sqlite3 CVE-2023-7104
Tomcat CVE-2024-23672
CVE-2024-24549
vim CVE-2024-22667

Environment

VMware Aria Operations for Logs 8.16.x

Resolution

Prerequisites

  • Create a snapshot or backup copy of the VMware Aria Operations for Logs virtual appliance(s)
  • Obtain a copy of the VMware Aria Operations for Logs upgrade bundle .pak file for the release you are upgrading to
  • Verify that you are logged in to the VMware Aria Operations for Logs web user interface as a user with the Edit Admin permission. The URL format is https://log-insight-host, where log-insight-host is the IP address or host name of the primary node of the VMware Aria Operations for Logs virtual cluster.
  • Make a note of any nodes you are upgrading that are in maintenance mode. Ensure you take all nodes out of maintenance mode prior to the upgrade.  When the upgrade is finished, you may move them from the state Connected to Maintenance mode.

 

Procedure

  1. Download the appropriate upgrade .pak file from the Broadcom Support Portal
  2. Click the configuration drop-down menu icon and select Administration.
  3. Under Management, click Cluster.
  4. Click Upgrade from PAK to upload the .pak file.
  5. Accept the new EULA to complete the upgrade procedure.

 

What to do next

  • After the primary node upgrade process is complete, you can view the remaining upgrade process, which is automatic.
  • Check for the email sent to the Admin to confirm the upgrade completed successfully.
  • Remove the snapshots from the VMware Aria Operations for Logs appliance(s) within ~72 hours after a successful upgrade to avoid performance issues



 

Additional Information

Once the update is completed successfully, delete the snapshots you made before the software update.