Latest VMware ESXi Patch #1
VMware has released patches for fixing security issues on ESXi. ESXi 6.0, 6.5 and 6.7 are live versions and there is no patch for older version. So if there is any older version in your environment, update the ESXi server immediately to supported versions.
VMware ESXi 6.7, Patch Release ESXi670-201905001
Name | Version | Vendor | Summary | Category | Severity | Bulletin |
---|---|---|---|---|---|---|
cpu-microcode | 6.7.0-2.55.13644319 | VMware | CPU microcode updates | bugfix | important | ESXi670-201905402-BG |
esx-base | 6.7.0-2.55.13644319 | VMware | ESXi base system | bugfix | important | ESXi670-201905401-BG |
esx-ui | 1.33.3-13454473 | VMware | VMware Host Client | bugfix | critical | ESXi670-201905403-BG |
esx-update | 6.7.0-2.55.13644319 | VMware | ESXi install/upgrade components. | bugfix | important | ESXi670-201905401-BG |
vsan | 6.7.0-2.55.13356300 | VMware | VSAN ESXi | bugfix | important | ESXi670-201905401-BG |
vsanhealth | 6.7.0-2.55.13356305 | VMware | ESXi VSAN Health Service | bugfix | important | ESXi670-201905401-BG |
ESXi 670-201905001 supports Hypervisor-Specific Mitigations and Hypervisor-Assisted Guest Mitigations for Microarchitectural Data Sampling (MDS) vulnerabilities identified by CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2019-11091. For more information, see VMware Security Advisory VMSA-2019-0008.
NOTE: At the time of this publication updated Sandy Bridge DT/EP Microcode Updates (MCUs) had not yet been provided to VMware. Customers on this microarchitecture may request MCUs from their hardware vendor in the form of a BIOS update. This microcode will be included in future releases of ESXi.
VMware ESXi 6.5, Patch Release ESXi650-201905001
Name | Version | Vendor | Summary | Category | Severity | Bulletin |
---|---|---|---|---|---|---|
cpu-microcode | 6.5.0-2.88.13635690 | VMware | Updates the ESX 6.5.0 cpu-microcode | bugfix | important | ESXi650-201905402-BG |
esx-base | 6.5.0-2.88.13635690 | VMware | Updates the ESX 6.5.0 esx-base | bugfix | important | ESXi650-201905401-BG |
esx-tboot | 6.5.0-2.88.13635690 | VMware | Updates the ESX 6.5.0 esx-tboot | bugfix | important | ESXi650-201905401-BG |
vsan | 6.5.0-2.88.13111446 | VMware | Updates the ESX 6.5.0 vsan | bugfix | critical | ESXi650-201905401-BG |
vsanhealth | 6.5.0-2.88.13111447 | VMware | ESXi VSAN Health Service | bugfix | important | ESXi650-201905401-BG |
ESXi 650-201905001 supports Hypervisor-Specific Mitigations and Hypervisor-Assisted Guest Mitigations for Microarchitectural Data Sampling (MDS) vulnerabilities identified by CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2019-11091. For more information, see VMware Security Advisory VMSA-2019-0008.
NOTE: At the time of this publication updated Sandy Bridge DT/EP Microcode Updates (MCUs) had not yet been provided to VMware. Customers on this microarchitecture may request MCUs from their hardware vendor in the form of a BIOS update. This microcode will be included in future releases of ESXi.
VMware ESXi 6.0, Patch Release ESXi600-201905001
Name | Version | Vendor | Summary | Category | Severity | Bulletin |
---|---|---|---|---|---|---|
cpu-microcode | 6.0.0-3.116.13635687 | VMware | Updates the ESX 6.0.0 cpu-microcode | bugfix | important | ESXi600-201905402-BG |
esx-base | 6.0.0-3.116.13635687 | VMware | Updates the ESX 6.0.0 esx-base | bugfix | important | ESXi600-201905401-BG |
vsan | 6.0.0-3.116.13111540 | VMware | ESXi VSAN | bugfix | important | ESXi600-201905401-BG |
vsanhealth | 6.0.0-3000000.3.0.3.116.13111541 | VMware | Updates the ESX 6.0.0 vsanhealth | bugfix | important | ESXi600-201905401-BG |
ESXi 600-201905001 supports Hypervisor-Specific Mitigations and Hypervisor-Assisted Guest Mitigations for Microarchitectural Data Sampling (MDS) vulnerabilities identified by CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2019-11091. For more information, see VMware Security Advisory VMSA-2019-0008.
NOTE: At the time of this publication updated Sandy Bridge DT/EP Microcode Updates (MCUs) had not yet been provided to VMware. Customers on this microarchitecture may request MCUs from their hardware vendor in the form of a BIOS update. This microcode will be included in future releases of ESXi.
like.