Search the VMware Knowledge Base (KB)
View by Article ID

VMware vCenter Server Appliance 5.0 Update 3b Express Patch Release (2091017)

  • 0 Ratings

Details

Release date: October 01, 2014

Build: 2170782

This patch updates Bash libraries in VMware vCenter Server Appliance to resolve multiple critical security issues, also referred to as Shellshock. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2014-6271CVE-2014-7169CVE-2014-7186, and CVE-2014-7187 to these issues.

Solution

VMware vCenter Server Appliance 5.0.Update 3b resolves the Bash shell vulnerability.

To update vCenter Server Appliance, use one of the following options. 

  1. Using an ISO file (VMware-vCenter-Server-Appliance-5.0.0.12963-2170782-updaterepo.iso) that the appliance reads from the virtual CD-ROM drive. For update instructions, see Update the VMware vCenter Server Appliance from the CD-ROM Drive.
  2. Using a local repository to update from a zipped update bundle (VMware-vCenter-Server-Appliance-5.0.0.12963-2170782-updaterepo.zip). For update instructions, see Update the VMware vCenter Server Appliance from a Zipped Update Bundle.
  3. Update using a public repository on the VMware.com Web site. For update instructions, see Update the VMware vCenter Server Appliance from a VMware.com Repository.

Note

  • Applications installed on Windows are not affected. 
  • Applications installed on a Linux operating system that is not part of a virtual appliance might be at risk. Contact the vendor of your Linux-based operating system for advice and patches.

Additional Information

For translated versions of this article, see:

Request a Product Feature

To request a new product feature or to provide feedback on a VMware product, please visit the Request a Product Feature page.

Feedback

  • 0 Ratings

Did this article help you?
This article resolved my issue.
This article did not resolve my issue.
This article helped but additional information was required to resolve my issue.

What can we do to improve this information? (4000 or fewer characters)




Please enter the Captcha code before clicking Submit.
  • 0 Ratings
Actions
KB: