Latest VMware ESXi Patch #1

VMware has released patches for fixing security issues on ESXi. ESXi 6.0, 6.5 and 6.7 are live versions and there is no patch for older version. So if there is any older version in your environment, update the ESXi server immediately to supported versions.

VMware ESXi 6.7, Patch Release ESXi670-201905001

NameVersionVendorSummaryCategorySeverityBulletin
cpu-microcode6.7.0-2.55.13644319VMwareCPU microcode updatesbugfiximportantESXi670-201905402-BG
esx-base6.7.0-2.55.13644319VMwareESXi base systembugfiximportantESXi670-201905401-BG
esx-ui1.33.3-13454473VMwareVMware Host ClientbugfixcriticalESXi670-201905403-BG
esx-update6.7.0-2.55.13644319VMwareESXi install/upgrade components.bugfiximportantESXi670-201905401-BG
vsan6.7.0-2.55.13356300VMwareVSAN ESXibugfiximportantESXi670-201905401-BG
vsanhealth6.7.0-2.55.13356305VMwareESXi VSAN Health ServicebugfiximportantESXi670-201905401-BG

ESXi 670-201905001 supports Hypervisor-Specific Mitigations and Hypervisor-Assisted Guest Mitigations for Microarchitectural Data Sampling (MDS) vulnerabilities identified by CVE-2018-12126CVE-2018-12127CVE-2018-12130, and CVE-2019-11091. For more information, see VMware Security Advisory VMSA-2019-0008.

NOTE: At the time of this publication updated Sandy Bridge DT/EP Microcode Updates (MCUs) had not yet been provided to VMware. Customers on this microarchitecture may request MCUs from their hardware vendor in the form of a BIOS update. This microcode will be included in future releases of ESXi.

VMware ESXi 6.5, Patch Release ESXi650-201905001

NameVersionVendorSummaryCategorySeverityBulletin
cpu-microcode6.5.0-2.88.13635690VMwareUpdates the ESX 6.5.0 cpu-microcodebugfiximportantESXi650-201905402-BG
esx-base6.5.0-2.88.13635690VMwareUpdates the ESX 6.5.0 esx-basebugfiximportantESXi650-201905401-BG
esx-tboot6.5.0-2.88.13635690VMwareUpdates the ESX 6.5.0 esx-tbootbugfiximportantESXi650-201905401-BG
vsan6.5.0-2.88.13111446VMwareUpdates the ESX 6.5.0 vsanbugfixcriticalESXi650-201905401-BG
vsanhealth6.5.0-2.88.13111447VMwareESXi VSAN Health ServicebugfiximportantESXi650-201905401-BG

ESXi 650-201905001 supports Hypervisor-Specific Mitigations and Hypervisor-Assisted Guest Mitigations for Microarchitectural Data Sampling (MDS) vulnerabilities identified by CVE-2018-12126CVE-2018-12127CVE-2018-12130, and CVE-2019-11091. For more information, see VMware Security Advisory VMSA-2019-0008.

NOTE: At the time of this publication updated Sandy Bridge DT/EP Microcode Updates (MCUs) had not yet been provided to VMware. Customers on this microarchitecture may request MCUs from their hardware vendor in the form of a BIOS update. This microcode will be included in future releases of ESXi.

VMware ESXi 6.0, Patch Release ESXi600-201905001

NameVersionVendorSummaryCategorySeverityBulletin
cpu-microcode6.0.0-3.116.13635687VMwareUpdates the ESX 6.0.0 cpu-microcodebugfiximportantESXi600-201905402-BG
esx-base6.0.0-3.116.13635687VMwareUpdates the ESX 6.0.0 esx-basebugfiximportantESXi600-201905401-BG
vsan6.0.0-3.116.13111540VMwareESXi VSANbugfiximportantESXi600-201905401-BG
vsanhealth6.0.0-3000000.3.0.3.116.13111541VMwareUpdates the ESX 6.0.0 vsanhealthbugfiximportantESXi600-201905401-BG

ESXi 600-201905001 supports Hypervisor-Specific Mitigations and Hypervisor-Assisted Guest Mitigations for Microarchitectural Data Sampling (MDS) vulnerabilities identified by CVE-2018-12126CVE-2018-12127CVE-2018-12130, and CVE-2019-11091. For more information, see VMware Security Advisory VMSA-2019-0008.

NOTE: At the time of this publication updated Sandy Bridge DT/EP Microcode Updates (MCUs) had not yet been provided to VMware. Customers on this microarchitecture may request MCUs from their hardware vendor in the form of a BIOS update. This microcode will be included in future releases of ESXi.

Further Reading

Latest VMware vCenter Patch #1

Davoud Teimouri

Davoud Teimouri is as a professional blogger, vExpert 2015/2016/2017/2018/2019/2020/2021/2022, vExpert NSX, vExpert PRO, vExpert Security, VCA, MCITP. This blog is started with simple posts and now, it has large following readers.

2 Responses

Leave a Reply

Your email address will not be published. Required fields are marked *