Knowledge Base

The VMware Knowledge Base provides support solutions, error messages and troubleshooting guides
 
Search the VMware Knowledge Base (KB)   View by Article ID
 

VMware ESX 3.0.3, Patch ESX303-201102401-SG: Updates Kerberos package (1031234)

Details

Release Date: February 15, 2011

Download Size:
527KB
Download Filename:
ESX303-201102401-SG.zip
md5sum: cbbdff4d55f2ba344198dc4104efcef6
 
Product Versions ESX 3.0.3
Patch Classification Security
Supersedes ESX303-200908403-SG
Requires
ESX303-201102403-BG
ESX303-201002207-UG
Virtual Machine Migration or Reboot Required Yes
Host Reboot Required Yes
PRs Fixed 563965
Affected Hardware N/A
Affected Software N/A
RPMs Included krb5-libs, pam_krb5
Related CVE Numbers CVE-2010-1321

Solution

Summaries and Symptoms

The service console RPM for krb5 is updated to krb5-libs-1.2.7-72. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2010-1321 to the security issue that this update addresses.

Deployment Considerations

None beyond the required patch bundles and reboot information listed in the table above.

Patch Download and Installation

See the vCenter Update Manager Administration Guide for instructions on using Update Manager to download and install patches to automatically update ESX 3.0.x hosts.
To update ESX 3.0.x hosts without using Update Manager, download the most recent patch bundle from http://www.vmware.com/patch/download/  and install the bundle using esxupdate from the command line of the host. For more information, see the ESX Server 3 Patch Management Guide.

Request a Product Feature

To request a new product feature or to provide feedback on a VMware product, please visit the Request a Product Feature page.

Feedback

  • 0 Ratings

Did this article help you?
This article resolved my issue.
This article did not resolve my issue.
This article helped but additional information was required to resolve my issue.
What can we do to improve this information? (4000 or fewer characters)
  • 0 Ratings
Actions
KB: