This patch updates the esx-base, vsan and vsanhealth VIBs to resolve the following issues:
This ESXi patch provides part of the hypervisor-assisted guest mitigation of CVE-2018-3639 for guest operating systems. For important details on this mitigation, see VMware Security Advisory VMSA-2018-0012.1.
VMware ESXi contains multiple out-of-bounds read vulnerabilities in the DX11 translator. Successful exploitation of these issues might lead to information disclosure or might allow attackers with normal user privileges to crash their virtual machines. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2018-6965, CVE-2018-6966, and CVE-2018-6967 to these issues.
Datastores might become inaccessible after a rebootless upgrade in ESXi configurations with LSI controllers. This is because a STOP UNIT command, sent to drives during driver unload, is not matched with a START UNIT command during load. As result, the drive media might be inaccessible after a reboot.