Impact Assessment:
- Functionality impacts are limited to IDPA Internal vCenter during the implementation of remediation procedure.
- No impact to customer backups, replications, and restore functionality.
- IDPA Internal VM (ACM, DPA, and so on) backups get impacted if they are running during the implementation of this procedure.
Important Note:
An automated procedure has been provided and can be run from the ACM.
Note: Dell EMC has released a new cumulative automated vCenter patch utility for versions 2.5, and 2.6.x which provides remediation for VMSA-2021-0010 and VMSA-2021-0020.
Download:
Option 1: Direct link
Note: User must be logged into
Dell Support with their service account in order to download the utility.
Option 2: Download via Product Page Link
Steps
Note: Extract or unzip the vc-patch-2.0.0.zip file and follow the instructions below.
- Copy the "vc-patch-2.0.0.jar" to "/data01" folder on Appliance Configuration Manager using an SCP client like WinSCP. SSH to ACM using an SSH client such as PuTTY using root and appliance password. Go to /data01 folder using "cd /data01" command.
- Check sha256 sum of the file "vc-patch-2.0.0.jar" and ensure it matches with sha256sum provided in "vc-patch-2.0.0.jar.sha256" file.
- Run "java -jar vc-patch-2.0.0.jar." The patch performs prechecks and applies the vCenter patch on IDPA vCenter.
- Delete "vc-patch-2.0.0.jar" from "/data01" folder on ACM after successful execution using command "rm vc-patch-2.0.0.jar."
- Hit the vCenter IP in browser (like Chrome). Log in to vCenter HTML5 UI using root and password as appliance password. Click Help About VMware vSphere. You should see the following version.
- If the manual workaround to mitigate this VMSA was applied previously on IDPA 2.5 or 2.6.x, then revert the workaround steps after applying this patch. Steps to revert mitigation are present in the same mitigation KB "VMSA-2021-0010 in vCenter mitigation for IDPA 2.5 and 2.6.x_csp.docx" attached.