{"id":615,"date":"2021-10-01T10:38:57","date_gmt":"2021-10-01T10:38:57","guid":{"rendered":"https:\/\/robinplomp.com\/?p=615"},"modified":"2022-01-12T14:01:42","modified_gmt":"2022-01-12T14:01:42","slug":"vmware-vcenter-upgrade-test-rpm-transaction-failed","status":"publish","type":"post","link":"https:\/\/robinplomp.com\/?p=615","title":{"rendered":"VMware vCenter upgrade, Test RPM transaction failed"},"content":{"rendered":"<p><a href=\"https:\/\/robinplomp.com\/wp-content\/uploads\/2021\/10\/index.png\"><img loading=\"lazy\" decoding=\"async\" title=\"index\" style=\"float: left; display: inline; background-image: none;\" alt=\"index\" src=\"https:\/\/robinplomp.com\/wp-content\/uploads\/2021\/10\/index_thumb.png\" width=\"132\" height=\"96\" border=\"0\" align=\"left\"><\/a>VMware has identified a security thread within vCenter. An upload vulnerability in vCenter&#8217;s Analytics service allows attackers to run arbitrary code on vulnerable servers. On a scale of 1 to 10 in terms of impact, the vulnerability, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22005\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2021-22005<\/a>, is rated 9.8. &#8220;The implications of this vulnerability are serious and it will only be a matter of time, probably minutes after the announcement, before working exploits appear,&#8221; VMware said on September 21. The thread has been registered by VMware under <a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2021-0002.html\" target=\"_blank\" rel=\"noopener noreferrer\">VMSA-2021-0002<\/a>.<br \/>\n<!--more--><br \/>\nTo mitigate the security issue you need to upgrade your vCenter instance to version 7.0U2d build 18455184.<\/p>\n<p>At a customer I am upgrading a vCenter from version 7.0.1.00100 to 7.0.2.00500. This version was released on September 16, VMware&nbsp; confirms in knowledge base article <a title=\"85717\" href=\"https:\/\/kb.vmware.com\/s\/article\/85717\">85717<\/a> that this version fixes the above mentioned issue.<\/p>\n<p>To install the update you need to logon to the vCenter Server Appliance Management Interface (VAMI). To access the VAMI you need to browse to <a href=\"https:\/\/vcenter.fqdn:5480\">https:\/\/vcenter.fqdn:5480<\/a>. In the left side menu click on Update.<a href=\"https:\/\/robinplomp.com\/wp-content\/uploads\/2021\/10\/2021-09-30-08_37_40-SBA-3PMGTAP-WIN-TeamViewer.png\"><img loading=\"lazy\" decoding=\"async\" title=\"2021-09-30 08_37_40-SBA-3PMGTAP-WIN - TeamViewer\" style=\"display: inline; background-image: none;\" alt=\"2021-09-30 08_37_40-SBA-3PMGTAP-WIN - TeamViewer\" src=\"https:\/\/robinplomp.com\/wp-content\/uploads\/2021\/10\/2021-09-30-08_37_40-SBA-3PMGTAP-WIN-TeamViewer_thumb.png\" width=\"449\" height=\"188\" border=\"0\"><\/a>The vCenter updates are cumulative so click on the latest version (in this case that is version 7.0.2.00500), and click on \u201c<em>Stage and Install&#8221;<\/em>\u201d.<\/p>\n<p><a href=\"https:\/\/robinplomp.com\/wp-content\/uploads\/2021\/10\/2021-09-30-08_39_44-SBA-3PMGTAP-WIN-TeamViewer.png\"><img loading=\"lazy\" decoding=\"async\" title=\"2021-09-30 08_39_44-SBA-3PMGTAP-WIN - TeamViewer\" style=\"display: inline; background-image: none;\" alt=\"2021-09-30 08_39_44-SBA-3PMGTAP-WIN - TeamViewer\" src=\"https:\/\/robinplomp.com\/wp-content\/uploads\/2021\/10\/2021-09-30-08_39_44-SBA-3PMGTAP-WIN-TeamViewer_thumb.png\" width=\"447\" height=\"203\" border=\"0\"><\/a><\/p>\n<p>The update starts running.<\/p>\n<p><a href=\"https:\/\/robinplomp.com\/wp-content\/uploads\/2021\/10\/2021-09-30-08_44_02-SBA-3PMGTAP-WIN-TeamViewer.png\"><img loading=\"lazy\" decoding=\"async\" title=\"2021-09-30 08_44_02-SBA-3PMGTAP-WIN - TeamViewer\" style=\"display: inline; background-image: none;\" alt=\"2021-09-30 08_44_02-SBA-3PMGTAP-WIN - TeamViewer\" src=\"https:\/\/robinplomp.com\/wp-content\/uploads\/2021\/10\/2021-09-30-08_44_02-SBA-3PMGTAP-WIN-TeamViewer_thumb.png\" width=\"443\" height=\"180\" border=\"0\"><\/a><\/p>\n<p>But after a couple of minutes the installation fails and the installation is stuck in an infinity loop.<\/p>\n<p>To break trough this loop you need to close the browser and logon to the vCenter via SSH.<\/p>\n<p><a href=\"https:\/\/robinplomp.com\/wp-content\/uploads\/2021\/10\/2021-09-30-08_56_59-SBA-3PMGTAP-WIN-TeamViewer.png\"><img loading=\"lazy\" decoding=\"async\" title=\"2021-09-30 08_56_59-SBA-3PMGTAP-WIN - TeamViewer\" style=\"display: inline; background-image: none;\" alt=\"2021-09-30 08_56_59-SBA-3PMGTAP-WIN - TeamViewer\" src=\"https:\/\/robinplomp.com\/wp-content\/uploads\/2021\/10\/2021-09-30-08_56_59-SBA-3PMGTAP-WIN-TeamViewer_thumb.png\" width=\"450\" height=\"285\" border=\"0\"><\/a><\/p>\n<p>After you logon you enter \u201c<em>Shell<\/em>\u201d to launch the BASH (Unix) Shell. Enter to following command to delete the state file that is causing the loop.<\/p>\n<p>\u201c<em>rn \/etc\/applmgmt\/appliance\/software_update_state.conf<\/em>\u201d<\/p>\n<p>When the file is deleted you need to reboot the vCenter Appliance.<\/p>\n<p><a href=\"https:\/\/robinplomp.com\/wp-content\/uploads\/2021\/10\/2021-09-30-09_05_37-SBA-3PMGTAP-WIN-TeamViewer.png\"><img loading=\"lazy\" decoding=\"async\" title=\"2021-09-30 09_05_37-SBA-3PMGTAP-WIN - TeamViewer\" style=\"display: inline; background-image: none;\" alt=\"2021-09-30 09_05_37-SBA-3PMGTAP-WIN - TeamViewer\" src=\"https:\/\/robinplomp.com\/wp-content\/uploads\/2021\/10\/2021-09-30-09_05_37-SBA-3PMGTAP-WIN-TeamViewer_thumb.png\" width=\"444\" height=\"281\" border=\"0\"><\/a><\/p>\n<p>After the reboot you execute the following command from the appliance shell: \u201c<em>software-packages install \u2013url \u2013acceptEulas<\/em>\u201d. Next you are prompted to enter SSO password for the <a href=\"mailto:administrator@vsphere.local\">administrator@vsphere.local<\/a> account.<\/p>\n<p><a href=\"https:\/\/robinplomp.com\/wp-content\/uploads\/2021\/10\/2021-09-30-09_30_17-SBA-3PMGTAP-WIN-TeamViewer.png\"><img loading=\"lazy\" decoding=\"async\" title=\"2021-09-30 09_30_17-SBA-3PMGTAP-WIN - TeamViewer\" style=\"display: inline; background-image: none;\" alt=\"2021-09-30 09_30_17-SBA-3PMGTAP-WIN - TeamViewer\" src=\"https:\/\/robinplomp.com\/wp-content\/uploads\/2021\/10\/2021-09-30-09_30_17-SBA-3PMGTAP-WIN-TeamViewer_thumb.png\" width=\"450\" height=\"194\" border=\"0\"><\/a><\/p>\n<p>After some patient waiting the message appears that the installation process was successful.<\/p>\n<p><a href=\"https:\/\/robinplomp.com\/wp-content\/uploads\/2021\/10\/2021-09-30-10_10_58-SBA-3PMGTAP-WIN-TeamViewer.png\"><img loading=\"lazy\" decoding=\"async\" title=\"2021-09-30 10_10_58-SBA-3PMGTAP-WIN - TeamViewer\" style=\"display: inline; background-image: none;\" alt=\"2021-09-30 10_10_58-SBA-3PMGTAP-WIN - TeamViewer\" src=\"https:\/\/robinplomp.com\/wp-content\/uploads\/2021\/10\/2021-09-30-10_10_58-SBA-3PMGTAP-WIN-TeamViewer_thumb.png\" width=\"450\" height=\"253\" border=\"0\"><\/a><\/p>\n<p>When you log back into vCenter you can confirm that vCenter is now upgraded and the security thread is mitigated.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>VMware has identified a security thread within vCenter. An upload vulnerability in vCenter&#8217;s Analytics service allows attackers to run arbitrary code on vulnerable servers. On a scale of 1 to 10 in terms of impact, the vulnerability, CVE-2021-22005, is rated 9.8. &#8220;The implications of this vulnerability are serious and it will only be a matter &hellip; <a href=\"https:\/\/robinplomp.com\/?p=615\" class=\"more-link\">Lees verder <span class=\"screen-reader-text\">VMware vCenter upgrade, Test RPM transaction failed<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33,22],"tags":[45,47,46],"class_list":["post-615","post","type-post","status-publish","format-standard","hentry","category-vcenter","category-vmware","tag-cve-2021-22005","tag-test-rpm-transaction-failed","tag-vmsa-2021-0002"],"_links":{"self":[{"href":"https:\/\/robinplomp.com\/index.php?rest_route=\/wp\/v2\/posts\/615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/robinplomp.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/robinplomp.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/robinplomp.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/robinplomp.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=615"}],"version-history":[{"count":3,"href":"https:\/\/robinplomp.com\/index.php?rest_route=\/wp\/v2\/posts\/615\/revisions"}],"predecessor-version":[{"id":711,"href":"https:\/\/robinplomp.com\/index.php?rest_route=\/wp\/v2\/posts\/615\/revisions\/711"}],"wp:attachment":[{"href":"https:\/\/robinplomp.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/robinplomp.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/robinplomp.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}