Search the VMware Knowledge Base (KB)
View by Article ID

VMware ESXi 5.0, Patch ESXi500-201203101-SG: Updates esx-base VIB (2011432)

  • 3 Ratings

Details

Release date: March 15, 2012

Patch Category Security
Patch Severity Important
Build For build information, see KB 2010823.
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required No
Affected Hardware N/A
Affected Software N/A
VIBs Included VMware:esx-base:5.0.0-0.10.608089
PRs Fixed 762976, 776621, 782966, 785495, 817811
Related CVE numbers CVE-2009-3560, CVE-2009-3720, CVE-2010-1634, CVE-2010-2089, CVE-2011-1521, and CVE-2010-0405

 

 For information on patch and update classification, see KB 2014447 .

Solution

Summaries and Symptoms

This patch updates the esx-base VIB to resolve the following issues: 
  • PR 762976: After you log in to an ESXi host at the console and then log in to the Tech Support Mode (Mode) as root user and initiate a remote server console access session, a non-privileged user might obtain root access to the ESXi host, if the remote access session has not timed out or remains idle.

    Starting with this release, you can configure a session timeout to exit ESXi Tech Support Mode (TSM) as follows:

    1. Log in to Tech Support Mode (Mode) as root user.
    2. Edit /etc/profile file to add TMOUT=<timeout value in seconds>
    3. Exit Tech Support Mode (Mode)
  • PR 776621: Mac OS X guest operating systems do not treat virtual disks as internal devices
  • PR 782966: Logs are written to syslog server even if syslog firewall rule-set is not enabled on an ESXi host.
  • PR 785495: The Python third party library is updated to version 2.6.7 on ESXi to resolve multiple security issues.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-3560, CVE-2009-3720, CVE-2010-1634, CVE-2010-2089, and CVE-2011-1521 to these issues.
  • PR 817811: The bzip2 library is updated to version 1.0.6, which resolves a security issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2010-0405 to this issue.

Deployment Considerations

None beyond the required patch bundles and reboot information listed in the table above.

Patch Download and Installation

The typical way to apply patches to ESXi hosts is through the VMware Update Manager. For details, see the Installing and Administering VMware vSphere Update Manager.

 

Request a Product Feature

To request a new product feature or to provide feedback on a VMware product, please visit the Request a Product Feature page.

Feedback

  • 3 Ratings

Did this article help you?
This article resolved my issue.
This article did not resolve my issue.
This article helped but additional information was required to resolve my issue.

What can we do to improve this information? (4000 or fewer characters)




Please enter the Captcha code before clicking Submit.
  • 3 Ratings
Actions
KB: