VMware good2know [20.10.2024]

Newsletter

News from 10/13/2024 – 10/20/2024

Release Notes

ProductVersionRelease Date
HCX4.10.110/16/24Release Notes
HCX4.9.210/16/24Release Notes
HCX4.8.310/16/24Release Notes
Data Services Manager2.1.310/16/24Release Notes
vCenter Server (VMSA-2024-0019.2)7.0 u3t10/21/24Release Notes
vCenter Server (VMSA-2024-0019.2)8.0 u2e10/21/24Release Notes
vCenter Server (VMSA-2024-0019.2)8.0 u3d10/21/24Release Notes
#Release Notes

VCF BOM

VCF 5.2.1 BOM
Cloud Builder VM5.2.110/0924307856Release Notes
SDDC Manager5.2.110/0924307856Releae Notses
VMware vCenter Server Appliance8.0 U3c10/0924305161Release Notes
VMware ESXi8.0 U3b09/1724280767Release Notes
VMware vSAN Witness Appliance8.0 U3b09/1724280767Release Notes
VMware NSX4.2.110/0924304122Release Notes
VMware Aria Suite Lifecycle8.1807/2324029603Release Notes
# VCF 5.2.1  BOM (current Version) [Release Notes]

Security Advisory

VMSA-2024-0021 [HIGH][HCX][CVSSv3: 8.8]

CVE(s)

  • Authenticated SQL injection in VMware HCX
    (CVE-2024-38814)
  • VMware NSX local privilege escalation vulnerability (CVE-2024-38818) 
  • VMware NSX content spoofing vulnerability
    (CVE-2024-38815) 

Description:
VMware HCX contains an authenticated SQL injection vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.8. A malicious authenticated user with non-administrator privileges may be able to enter specially crafted SQL queries and perform unauthorized remote code execution on the HCX manager. To remediate CVE-2024-38814 apply the patches listed in the ‚Fixed Version‘ column of the ‚Response Matrix‘ found below. VMware would like to thank Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) working with Trend Micro Zero Day Initiative (ZDI) for reporting this issue to us.

Response Matrix:

VersionCVEFixed VersionWorkaround
4.10.xCVE-2024-388144.10.1None
4.9.xCVE-2024-388144.9.2None
4.8.xCVE-2024-388144.8.3None

Knowledge Base Article

SubjectKB Article
Virtual Machine becomes unresponsive or hangs when the CPU Limit is set to 0380079
ESXi.firewall-restrict-access The Configuration of the ESXi host firewall to restrict access to services running on the host is not as per the recommended value380049
VM performance issues due to FC command timeouts and link failures380045
Unable to Deploy Virtual Machine Through VMware Aria Automation Due to Missing Image Mapping379919
NSX collection notification missed from Notifications icon379895
Understanding License Usage for embedded Adapter instances379889
Telegraf agent failed to install – „Control channel does not exist or could not be established“379851
Operation Management vSAN Configuration widget objects are all empty.379838
Location of minion config files on Windows machine379823
After migration of Chargeback to Aria Operations, alerts do not show on the Tenant Portal379822
Unable to convert a VMware virtual machine snapshot to a memory dump379821
Error resolving „<Support Tunnel FQDN>“: Temporary failure in name resolution (EAI_AGAIN)379786
NSX-T Edge Upgrade fails to download the nub bundle379765
Troubleshooting NSX IPSEC VPN379731
ESXi fails with PSOD Panic Message: @BlueScreen: NMI IPI: Panic requested by another PCPU. RIPOFF(base)379711
Broken management channel on port 1234 resulting in datapath impacts379698
Powered off VMS with snapshots are not showing under reclaim379680
HCX is not migrating or passing traffic over network extensions at expected speeds379617
Host status ‚unknown‘ in vLCM379607
Unable to apply vSphere license to ESXi hosts379600
VMs are not showing in discovered state379588
Is it possible to transfer Nvidia GPU graphics profiles between vms?379573


Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert