VMware ESXi 6.5, Patch Release ESXi-6.5.0-20171201001s-standard
search cancel

VMware ESXi 6.5, Patch Release ESXi-6.5.0-20171201001s-standard

book

Article ID: 325244

calendar_today

Updated On:

Products

VMware vSphere ESXi

Issue/Introduction

Profile Name
ESXi-6.5.0-20171201001s-standard
Build
For build information, see KB 2151102.
Vendor
VMware, Inc.
Release Date
December 19, 2017
Acceptance Level
PartnerSupported
Affected Hardware
N/A
Affected Software
N/A
Affected VIBs
  • VMware_bootbank_esx-base_6.5.0-1.33.7273056
  • VMware_bootbank_esx-tboot_6.5.0-1.33.7273056
  • VMware_bootbank_vsan_6.5.0-1.33.6852403
  • VMware_bootbank_vsanhealth_6.5.0-1.33.6852404
  • VMware_locker_tools-light_6.5.0-1.33.7273056
  • VMware_bootbank_esx-ui_1.23.0-6506686
PRs Fixed
1828157, 1857698, 1878456, 1892202, 1921459, 1936087, 1938277, 1941187, 1942651, 1946010, 1950568, 1965834, 1966422, 1968463, 1968467, 1973770, 1973828, 1927429, 1963854, 1978164
Related CVE numbers
N/A


Resolution

Summaries and Symptoms

This patch updates the following issues:

  • The libPNG library is updated to libpng-1.6.30.

  • ESXi hosts with virtual machines using vmxnet3 virtual NICs might fail, if a transmission queue index, passed by a guest driver, is greater than the configured number of transmission queues and is equal or less than eight, which might result in invalid memory access or a null pointer reference. This patch fixes the issue by validating values passed by guest drivers against the configured number of transmission queues.

  • OpenSSL is updated to version 1.0.2l.

  • Hostd might run out of memory due to a vNIC link flap, because if multiple virtual machines connected to a distributed virtual switch generate frequent vNIC flaps, this might result in a large number of events posted to hostd that might exceed its memory limit.

  • This release resolves a vulnerability in the ESXi Embedded Host Client that might allow for stored cross-site scripting (XSS). The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2017-4940 to this issue.

Patch Download and Installation

The typical way to apply patches to ESXi hosts is through the VMware vSphere Update Manager. For details, see the Installing and Administering VMware vSphere Update Manager.

ESXi hosts can be updated by manually downloading the patch ZIP file from the VMware download page and installing the VIB by using the esxcli software vib command. Additionally, the system can be updated using the image profile and the esxcli software profile command. For details, see the vSphere Command-Line Interface Concepts and Examples and the vSphere Upgrade Guide.