VMware Aria Operations 8.16 Hot Fix 1 is a public Hot Fix that addresses the following issues:
- Importing integrations accounts from a single page from Aria Operations SaaS to on-prem setup fails
- Export / Import SDMP cloud account doesn't work
- Inappropriate message on the Launchpad page after adding VVF/VCF permanent licensed vCenter adapter instances
- When there are permanent and non-permanent licensed vCenter adapter instances available, the non-permanent license gets displayed on the Licensing page
- [ST] Aria Operations - License status message needs to be enhanced when inactive
- Pagination of the REST API call doesn't work properly on WLP-History, Custom Datacenters chargeback Notification Rules GET APIs
- Global Settings: Name and description of several global settings needs to be updated
- Notifications: UI: Object Type clear doesn't work
- Notifications: UI: Object Details doesn't show Custom Properties from templates
- After the upgrade process, the VVF/VCF-related license info is updated after nearly an hour
- The message on the "License Expired" window is updated
- vcopsgfsh.py and vcopsgfsh.sh scripts fail to run
- Webhook Payload Template: Some Parameters contain spaces in their names, and it leads to inability to create Webhook template using that parameters.
- The "Aria Operations" should be changed to "VMware Aria Operations"
- Cost: "Total Cost of Ownership" value is negative
- [vCenter MP] Property Domain Membership Status is not updated
- [Aria Operations remote client] VC remote plugin registration failed when Aria Operations node does not have FQDN
- Evaluation and entitlement licenses are displayed in the described case
- Payload Templates are removing space from string variables
The following CVEs have been resolved as of version 8.16 Hot Fix 1:
Note: Inclusion of a given CVE in the following table does not imply exploitability of said CVE.
Component Name | CVE |
c-ares | CVE-2024-25629 |
chromium | CVE-2023-4369 |
CVE-2023-6345 |
CVE-2023-6350 |
CVE-2023-6351 |
CVE-2023-6508 |
CVE-2023-6509 |
CVE-2023-6510 |
CVE-2023-6511 |
CVE-2023-6702 |
CVE-2023-6703 |
CVE-2023-6704 |
CVE-2023-6705 |
CVE-2023-6706 |
CVE-2023-6707 |
CVE-2023-7024 |
CVE-2024-0222 |
CVE-2024-0223 |
CVE-2024-0224 |
CVE-2024-0225 |
CVE-2024-0333 |
CVE-2024-0517 |
CVE-2024-0518 |
CVE-2024-0519 |
CVE-2024-0804 |
CVE-2024-0805 |
CVE-2024-0806 |
CVE-2024-0807 |
CVE-2024-0808 |
CVE-2024-0809 |
CVE-2024-0810 |
CVE-2024-0811 |
CVE-2024-0812 |
CVE-2024-0813 |
CVE-2024-0814 |
CVE-2024-1059 |
CVE-2024-1060 |
CVE-2024-1077 |
CVE-2024-1283 |
CVE-2024-1284 |
CVE-2024-1669 |
CVE-2024-1670 |
CVE-2024-1671 |
CVE-2024-1672 |
CVE-2024-1673 |
CVE-2024-1674 |
CVE-2024-1675 |
CVE-2024-1676 |
CVE-2024-1938 |
CVE-2024-1939 |
CVE-2024-2173 |
CVE-2024-2174 |
CVE-2024-2176 |
cryptography | CVE-2023-49083 |
CVE-2023-50782 |
CVE-2024-26130 |
libuv | CVE-2024-24806 |
libvpx | CVE-2023-44488 |
CVE-2023-5217 |
CVE-2023-6349 |
linux_kernel | CVE-2023-52435 |
CVE-2023-52595 |
CVE-2024-1086 |
CVE-2024-1151 |
CVE-2024-23849 |
CVE-2024-23850 |
CVE-2024-25741 |
CVE-2024-25744 |
CVE-2024-26593 |
CVE-2024-26600 |
CVE-2024-26602 |
CVE-2024-26615 |
CVE-2024-26625 |
vim | CVE-2024-22667 |