Support Experience Cloud Skyline

VMware Skyline Advisor Pro Proactive Findings – April 2023 Edition

VMware Skyline Advisor Pro releases new proactive Findings every month. Findings are prioritized by trending issues in VMware Technical Support, issues raised through post escalation review, security vulnerabilities, issues raised from VMware engineering, and nominated by customers.

For the month of April, we released 45 new Findings. Of these, there are 34 Findings based on trending issues, 10 based on post escalation reviews, and 1 based on VMSAs. We picked a few of these findings from each of these categories which stand out in this release.

Security Vulnerabilities

In VMSA-2023-0007, VMware Aria Operations for Logs contains a deserialization vulnerability and a command injection vulnerability. For CVE-2023-20864, an unauthenticated, malicious actor with network access to VMware Aria Operations for Logs may be able to execute arbitrary code as root. For CVE-2023-20865, a malicious actor with administrative privileges in VMware Aria Operations for Logs can execute arbitrary commands as root. VMware has evaluated the severity of CVE-2023-20864 & CVE-2023-20865 to be Critical and Important severity range with a maximum CVSSv3 base score of 9.8 and 7.2. To remediate CVE-2023-20864 & CVE-2023-20865 please update VMware Aria Operations for Logs to 8.12.0.

VMware Technical Support Trending Issues

VMware Technical Support trending issues are KBs that have solved many SRs and/or are viewed many times.

In KB#90340, ESXi hosts and/or VMs are at risk of crashing due to a race condition. Recent performance optimizations for vMotion have introduced a race condition between pre-validation and swapping that may lead to memory corruption. The corruption may manifest into different types of crashes including VMkernel PSOD and guest BSOD. Some common but not exhaustive list of VMkernel PSOD backtraces observed are given in the KB noted below. This issue is resolved VMware ESXi 7.0 U3j and VMware ESXi 8.0b.

  • Finding ID: vSphere-PSODCpuSched_StartWorld-KB#90340
  • Description: ESXi Host PSOD or Virtual Machine crash after VMs vMotion due to a race condition.
  • Helpful Link: https://kb.vmware.com/s/article/90340
  • Severity: CRITICAL

Post Escalation Review

VMware Technical Support has developed a Post Escalation Review process. We review critical escalations which come into our Escalation Management team and determine steps to prevent these escalations in the future with other customers. One of the outcomes of this process is the creation of Skyline Findings.

In KB#78348, ESXi hosts become unresponsive with hostd failing or hanging when NFC operations such as backup or replication jobs are executed on disks with an IO filter attached. This issue is caused by a hostd worker thread limit exhaustion during specific NFC operations. This issue is resolved with VMware ESXi U3L.

  • Finding ID: vSphere-NFSConsistency-KB#78348

To review all released Findings for the month of April and all current active VMware Skyline Findings please go to the VMware Skyline Findings Catalog.

Most Viewed Findings in Last 30 Days

Below are the most viewed Findings by users in Skyline Advisor Pro:

  1. vSphere-VMmorethan3snapshots-KB#1025279
  2. vSphere-VCFEsxNTPRule-KB#81647
  3. vSphere-CustomizeWindowsGuests-KB#1020716
  4. vSphere-PSODFastSlabAllocSlow-KB#89131
  5. vSphere-VCFEsxRemoteSysLogRule-KB#81648
  6. NSXT-VCFManagerHostisolation-KB#81644
  7. vSphere-SpectreMeltdown-VMSA#201804-2
  8. vSphere-VMsnapshotover7days-KB#1025279
  9. vSphere-L1TerminalFault-VMSA#201820-3
  10. vSphere-CVE-2022-22977-VMSA#202215
  11. vSphere-VmUnresponsivememoryleak-KB#2077302
  12. Horizon-Log4jremotecodeexe-VMSA#202128
  13. vSphere-over1TBvm-KB#79520
  14. vSphere-EndpointCertExpiration
  15. vSphere-HPsmxprovider-KB#86291
  16. vSphere-CVE-2020-3992-VMSA#202023
  17. vSphere-XHCI-USB-controller-VMSA#202204
  18. vSphere-CVE-2021-21999-VMSA#202113
  19. vSphere-CVE-2022-22943-VMSA#202207
  20. vSphere-EsxiBuildInconsistent

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *