VMware ESXi 5.0 Security-only Image Profile ESXi-5.0.0-20120301001s-standard

Details

Release date: March 15, 2012
 
 

Profile Name
ESXi-5.0.0-20120301001s-standard
Build
For build information, see KB 2010823.
Vendor
VMware, Inc.
Release Date
March 15, 2012
Acceptance Level
PartnerSupported
Affected Hardware
N/A
Affected Software
N/A
Affected VIBs
VMware:esx-base:5.0.0-0.10.608089
VMware:tools-light:5.0.0-0.10.608089
VMware:net-e1000e:1.1.2-3vmw.500.0.10.608089
PRs Fixed
762976, 782966, 785495, 817811
Related CVE numbers
CVE-2009-3560, CVE-2009-3720, CVE-2010-1634, CVE-2010-2089, CVE-2011-1521, and CVE-2010-0405.

 

For information on patch and update classification, see KB 2014447.

Solution

Summaries and Symptoms

This patch updates the esx-basetools-light, and net-e1000eVIBs to resolve multiple issues:
  • The updated esx-base VIB resolves the following issues:
    • PR 762976: After you log in to an ESXi host at the console and then log in to the Tech Support Mode (Mode) as root user and initiate a remote server console access session, a non-privileged user might obtain root access to the ESXi host, if the remote access session has not timed out or remains idle.

      Starting with this release, you can configure a session timeout to exit ESXi Tech Support Mode (TSM) as follows:
      1. Log in to Tech Support Mode (Mode) as root user.
      2. Edit /etc/profile file to add TMOUT=
      3. Exit Tech Support Mode (Mode)
    • PR 782966: Logs are written to syslog server even if syslog firewall rule-set is not enabled on an ESXi host.
    • PR 785495: The Python third party library is updated to version 2.6.7 on ESXi to resolve multiple security issues.

      The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-3560, CVE-2009-3720, CVE-2010-1634, CVE-2010-2089, and CVE-2011-1521 to these issues.
    • PR 817811: The bzip2 library is updated to version 1.0.6, which resolves a security issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2010-0405 to this issue.
  • The updated tools-light VIB deprecates an old version of VMware Tools.
  • The updated net-e1000eVIB addresses a stability issue.
Deployment Considerations 

None beyond the required patch bundles and reboot information listed in the table above.

Patch Download and Installation

The typical way to apply patches to ESXi hosts is through the VMware Update Manager. For details, see the Installing and Administering VMware vSphere Update Manager.

Based on VMware KB 2012673

  • 0 Korisnici koji smatraju članak korisnim
Je li Vam ovaj odgovor pomogao?

Vezani članci

Hardware and firmware requirements for 64-bit guest operating systems

PurposeThis article explains the host machine hardware and firmware requirements for installing...

Logging in to the vCenter Server 5.0 Web Client fails with the error: unable to connect to vCenter Inventory Service

DetailsAfter upgrading from vCenter Server 4.1 to 5.0, you experience these symptoms:Cannot log...

Multiple network entries in vCenter Server 5.0.x after migrating virtual machines from a virtual switch to a virtual distributed switch

SymptomsAfter migrating virtual machines from a virtual switch to a virtual Distributed...

Minimum requirements for the VMware vCenter Server 5.x Appliance

PurposeIf you are using the VMware vCenter Server Appliance, beginning with vSphere 5.0 you can...