Search the VMware Knowledge Base (KB)
View by Article ID

ESX Server 3.0.0, Patch ESX-3616065: Third Party Code Library Security Update (3616065)

  • 0 Ratings


Security Issues

This patch updates the third-party code library zLib in order to address potential security issues with older versions of this library.

The Common Vulnerabilities and Exposures project ( has assigned the names CVE-2005-2096, CVE-2005-1849, and CAN-2003-0107 to this issue.



This patch is for ESX Server 3.0.0 only. For the related patch for ESX Server 3.0.1, refer to

Installing the Patch

Download Instructions

Download and verify the patch bundle as follows :

  1. Download patch ESX-3616065 from
  2. Log into the ESX Server service console as root.
  3. Create a local depot directory.

    # mkdir /var/updates

    Note: VMware recommends that you use the updates directory.

  4. Change your working directory to /var/updates.

    # cd /var/updates

  5. Download the tar file into the /var/updates directory.
  6. Verify the integrity of the downloaded tar file.

    # md5sum ESX-3616065.tgz

    The md5 checksum output should match the following:

    90e4face2edaab07080531a37a49ec01 ESX-3616065.tgz

  7. Extract the compressed tar archive.

    # tar -xvzf ESX-3616065.tgz

  8. Change to the newly created directory, /var/updates/ESX-3616065.

    # cd ESX-3616065

Installation Instructions
Note: All virtual machines on the host must be either shut down or migrated using VMotion before applying the patch. A reboot of the ESX Server host is required after applying this patch.

After you have downloaded and extracted the archive, and if you are in the directory you created above, install the update using the following command:

# esxupdate update

If you want to run esxupdate from a different directory, you must specify the bundle path in the command:

# esxupdate -r file://<directory>/ESX-3616065 update

For example, if the host is called depot:

# esxupdate –r file:///depot/var/updates/ESX-3616065 update

During the update process, logs appear on the terminal. You can specify the verbosity of esxupdate logs by using the -v option as shown below:

# esxupdate -v 10 -r file://<directory>/ESX-3616065 update

For more information on using esxupdate, please refer to the Patch Management for ESX Server 3 tech note at


esx300;esxpatch CVE-2005-2096, CVE-2005-1849, CAN-2003-0107

Request a Product Feature

To request a new product feature or to provide feedback on a VMware product, please visit the Request a Product Feature page.


  • 0 Ratings

Did this article help you?
This article resolved my issue.
This article did not resolve my issue.
This article helped but additional information was required to resolve my issue.

What can we do to improve this information? (4000 or fewer characters)

Please enter the Captcha code before clicking Submit.
  • 0 Ratings