vRealize Operations 8.6.4
search cancel

vRealize Operations 8.6.4

book

Article ID: 337329

calendar_today

Updated On:

Products

VMware Aria Suite

Issue/Introduction

vRealize Operations 8.6.4 is a public maintenance release of vRealize Operations in which issues related to performance and stability have been fixed.

The following issues have been resolved as of vRealize Operations 8.6.4:
  • Service Discovery in Japanese locale windows machine failing.
  • Tomcat Server & Gateway Security should show up with the right icons under Application Monitoring.
  • Metric and Attribute searches work using different logic. Make this experience consistent throughout the entities.
  • Failed to query data for "vSAN Overview" on vCenter plugin, FS enabled.
  • Telegraf agent not working as expected.
  • Potential XXE On platform api.
  • Potential XXE On platform Controller.
  • Potential XXE on Content.
  • Unable to monitor Oracle database using Telegraf Agent.
  • VMC on AWS adapter missed collecting a few subscriptions.
  • "ARC adapters status is warning for FIPS enabled setups".
  • FIPS enabled setups have intermittent issues while connecting CP to setup.
  • Analytics' service has been restarted by oom-killer.
  • "Preference" time is incorrect, when loging into vRealize Operations using vIDM.
  • Take cluster offline when /storage/log OR /storage/db partitions is filled more than 98%.
  • vRA collection fails with 'com.vmware.adapter3.cas.CASAdapter.onCollect : Forced timeout after 3600 SECONDS'.
  • Summary dashboard for VM objects not loading/not displaying correctly.
  • NPE on Test connection of LDAP server, configured through admin UI.
  • Monitoring windows services with underscore using Open source telegraf does not show complete servicename.
  • Content Management: REST API:  Downloaded zip file is invalid/corrupted.
  • Import of Notification rule via API : all Notifications disappear from the GUI view (Configuration > Alerts > Notifications).
  • Node addition fails on vRealize Operations 8.6.x cluster that was upgraded to HF.
  • Flashing "Please wait..." overlay is preventing UI access.
  • Service Monitoring for Windows has a gap in metric collection after every 6 collection cycles.
  • Timeout while trying to Rebalance (getShardBalancingScheme).
  • Problem collecting from large vSAN environments.

The following CVEs have been resolved as of vRealize Operations 8.6.4:
Component NameCVEFixed in
vRealize Operations ApplicationCVE-2022-31672vRealize Operations
CVE-2022-31673vRealize Operations
CVE-2022-31674vRealize Operations
CVE-2022-31675vRealize Operations
apacheCVE-2022-29404vRealize Operations, Cloud Proxy
CVE-2022-28614vRealize Operations, Cloud Proxy
CVE-2022-30556vRealize Operations, Cloud Proxy
CVE-2022-30522vRealize Operations, Cloud Proxy
CVE-2022-31813vRealize Operations, Cloud Proxy
CVE-2022-26377vRealize Operations, Cloud Proxy
CVE-2022-28330vRealize Operations, Cloud Proxy
CVE-2022-28615vRealize Operations, Cloud Proxy
batikCVE-2019-17566vRealize Operations
cifs-utilsCVE-2022-27239vRealize Operations, Cloud Proxy
CVE-2022-29869vRealize Operations, Cloud Proxy
containerdCVE-2022-23648Cloud Proxy
curlCVE-2022-27779vRealize Operations, Cloud Proxy
CVE-2022-27780vRealize Operations, Cloud Proxy
CVE-2022-30115vRealize Operations, Cloud Proxy
glibcCVE-2021-35942Cloud Proxy
CVE-2021-38604Cloud Proxy
CVE-2021-43396Cloud Proxy
CVE-2022-23218Cloud Proxy
CVE-2022-23219Cloud Proxy
gsonCVE-2022-25647vRealize Operations
jackson-databindCVE-2020-36518Cloud Proxy
libgcryptCVE-2021-40528Cloud Proxy
libsolvCVE-2021-33928Cloud Proxy
CVE-2021-33929Cloud Proxy
CVE-2021-33930Cloud Proxy
CVE-2021-33938Cloud Proxy
CVE-2021-44568Cloud Proxy
libxsltCVE-2021-30560vRealize Operations, Cloud Proxy
CVE-2022-29824vRealize Operations, Cloud Proxy
linux_kernelCVE-2022-28356vRealize Operations, Cloud Proxy
CVE-2022-1055vRealize Operations, Cloud Proxy
CVE-2022-0494vRealize Operations, Cloud Proxy
CVE-2021-4149vRealize Operations, Cloud Proxy
CVE-2021-4197vRealize Operations, Cloud Proxy
CVE-2022-0854vRealize Operations, Cloud Proxy
CVE-2022-27666vRealize Operations, Cloud Proxy
CVE-2022-1011vRealize Operations, Cloud Proxy
CVE-2022-23960vRealize Operations, Cloud Proxy
CVE-2021-26401vRealize Operations, Cloud Proxy
CVE-2022-0001vRealize Operations, Cloud Proxy
CVE-2022-0002vRealize Operations, Cloud Proxy
CVE-2022-23036vRealize Operations, Cloud Proxy
CVE-2022-23037vRealize Operations, Cloud Proxy
CVE-2022-23038vRealize Operations, Cloud Proxy
CVE-2022-23039vRealize Operations, Cloud Proxy
CVE-2022-23040vRealize Operations, Cloud Proxy
CVE-2022-23041vRealize Operations, Cloud Proxy
CVE-2022-23042vRealize Operations, Cloud Proxy
CVE-2022-24958vRealize Operations, Cloud Proxy
CVE-2022-33981vRealize Operations, Cloud Proxy
CVE-2022-1998vRealize Operations, Cloud Proxy
CVE-2022-1966vRealize Operations, Cloud Proxy
CVE-2022-32250vRealize Operations, Cloud Proxy
CVE-2022-1652vRealize Operations, Cloud Proxy
CVE-2022-1786vRealize Operations, Cloud Proxy
CVE-2022-29581vRealize Operations, Cloud Proxy
CVE-2022-30594vRealize Operations, Cloud Proxy
CVE-2022-1353vRealize Operations, Cloud Proxy
log4jCVE-2021-44832Cloud Proxy
mongooseCVE-2022-2564vRealize Operations
nssCVE-2021-43527Cloud Proxy
openldapCVE-2022-29155vRealize Operations, Cloud Proxy
postgresqlCVE-2022-24844vRealize Operations
CVE-2021-23214vRealize Operations
runcCVE-2022-29162Cloud Proxy
CVE-2022-24769Cloud Proxy
spring_frameworkCVE-2022-22968Cloud Proxy
CVE-2022-22950Cloud Proxy
CVE-2022-22965Cloud Proxy
CVE-2020-5421Cloud Proxy
CVE-2022-22970Cloud Proxy
spring-security-coreCVE-2022-22976vRealize Operations, Cloud Proxy
CVE-2022-22978vRealize Operations, Cloud Proxy
spring-security-webCVE-2022-22976vRealize Operations, Cloud Proxy
CVE-2022-22978vRealize Operations, Cloud Proxy
strutsCVE-2020-17530vRealize Operations, Cloud Proxy
CVE-2021-31805vRealize Operations, Cloud Proxy
tomcatCVE-2022-29885Cloud Proxy
toyboxCVE-2022-32298Cloud Proxy
vimCVE-2022-2210vRealize Operations, Cloud Proxy
CVE-2022-2208vRealize Operations, Cloud Proxy
CVE-2022-2207vRealize Operations, Cloud Proxy
CVE-2022-1619vRealize Operations, Cloud Proxy
CVE-2022-1927vRealize Operations, Cloud Proxy
CVE-2022-2129vRealize Operations, Cloud Proxy
CVE-2022-2126vRealize Operations, Cloud Proxy
CVE-2022-2125vRealize Operations, Cloud Proxy
CVE-2022-2124vRealize Operations, Cloud Proxy
CVE-2022-1720vRealize Operations, Cloud Proxy
CVE-2022-2175vRealize Operations, Cloud Proxy
CVE-2022-2183vRealize Operations, Cloud Proxy
CVE-2022-2182vRealize Operations, Cloud Proxy
CVE-2022-2206vRealize Operations, Cloud Proxy
CVE-2022-1616vRealize Operations, Cloud Proxy
CVE-2022-1420vRealize Operations, Cloud Proxy
CVE-2022-1381vRealize Operations, Cloud Proxy
CVE-2022-1851vRealize Operations, Cloud Proxy
CVE-2022-1886vRealize Operations, Cloud Proxy
CVE-2022-1898vRealize Operations, Cloud Proxy
CVE-2022-1942vRealize Operations, Cloud Proxy
CVE-2022-1620vRealize Operations, Cloud Proxy
CVE-2022-1733vRealize Operations, Cloud Proxy
CVE-2022-1771vRealize Operations, Cloud Proxy
CVE-2022-1785vRealize Operations, Cloud Proxy
CVE-2022-1796vRealize Operations, Cloud Proxy
CVE-2022-1769vRealize Operations, Cloud Proxy
CVE-2022-1735vRealize Operations, Cloud Proxy
CVE-2022-1674vRealize Operations, Cloud Proxy
CVE-2022-1629vRealize Operations, Cloud Proxy
CVE-2022-1621vRealize Operations, Cloud Proxy
xstreamCVE-2021-43859vRealize Operations


Environment

VMware vRealize Operations 8.6.x

Resolution

vRealize Operations 8.6.4 can be applied to any 8.0.x - 8.6.x environment.

It is recommended to take snapshots following How to take a Snapshot of vRealize Operations before upgrading.
  1. Download the vRealize Operations 8.6.4 upgrade PAK file from VMware Downloads.
  2. Log in to the master node vRealize Operations Administrator interface of your cluster at https://master-node-FQDN-or-IP-address/admin.
  3. Click Software Update in the left panel.
  4. Click Install a Software Update in the main panel.
  5. Follow the steps in the wizard to locate and install your PAK file.
  6. Install the product update PAK file.
    Wait for the software update to complete. When it does, the Administrator interface logs you out.
  7. Log back into the master node Administrator interface.
    The main Cluster Status page appears and cluster goes online automatically. The status page also displays the Bring Online button, but do not click it.
  1. Clear the browser caches and if the browser page does not refresh automatically, refresh the page.
    The cluster status changes to Going Online. When the cluster status changes to Online, the upgrade is complete.
Note: If a cluster fails and the status changes to offline during the installation process of a PAK file update then some nodes become unavailable. To fix this, you can access the Administrator interface and manually take the cluster offline and click Finish Installation to continue the installation process.
  1. Click Software Update to check that the update is done.
    A message indicating that the update completed successfully appears in the main pane.

Additional Information

Once the update is complete, delete the snapshots you made before the software update.

Note:  Some security scanner utilities may report on geode-log4j-1.12.0.jar as being impacted by CVE-2019-17571; this is a false positive and can safely be ignored.
The vulnerable class name in CVE-2019-17571 is SocketServer, where as the geode-log4j-1.12.0.jar jar file does not contain any class with SocketServer name.