B&B Bezpieczeństwo w biznesie
  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

Producent oprogramowania do wirtualizacji VMware opublikował właśnie kolejną wersję oprogramowania VMware vSphere Hypervisor (ESXi) 7.0U1. W najnowszej aktualizacji wprowadzono masę nowości oraz rozwiązano wiele błędów. Zachęcamy do zapoznania się z artykułem.

Nowości:

Ulepszone wstępne testy zgodności sprzętowej vSphere Lifecycle Manager dla środowisk vSAN: ESXi 7.0 Update 1 dodaje testy wstępne zgodności sprzętu vSphere Lifecycle Manager. Testy uruchamiają się automatycznie po pewnych zdarzeniach, takich jak modyfikacja żądanego obrazu klastra lub dodanie nowego hosta ESXi w środowiskach vSAN. Ponadto platforma zgodności sprzętu automatycznie sonduje w bazie danych listy zgodności sprzętu w określonych odstępach czasu pod kątem zmian, które w razie potrzeby wyzwalają wstępne testy.

Zwiększona liczba współbieżnych operacji vSphere Lifecycle Manager na klastrach: dzięki ESXi 7.0 Update 1, jeśli zainicjujesz działania zaradcze na poziomie centrum danych, liczba klastrów, na których można równolegle wykonywać środki zaradcze, wzrośnie z 15 do 64 klastrów.

Rozszerzona lista obsługiwanych wersji Red Hat Enterprise Linux i Ubuntu dla usługi pobierania VMware vSphere Update Manager (UMDS): ESXi 7.0 Update 1 dodaje nowe wersje Red Hat Enterprise Linux i Ubuntu obsługiwane przez UMDS.

Lepsza kontrola synchronizacji czasu VMware Tools: dzięki ESXi 7.0 Update 1 możesz wybrać tryb synchronizacji czasu VMware Tools z klienta vSphere zamiast korzystać z wiersza poleceń. Po przejściu do opcji VMware> Narzędzia VMware> Synchronizuj czas z hostem, możesz wybrać opcję Synchronizuj przy uruchamianiu i wznowieniu (zalecane), Synchronizuj czas okresowo lub, jeśli żadna opcja nie jest wybrana, możesz zapobiec synchronizacji.

Zwiększona obsługa maksymalnej tolerancji błędów wieloprocesorowych (SMP-FT): dzięki ESXi 7.0 Update 1 można skonfigurować więcej maszyn wirtualnych SMP-FT i więcej procesorów wirtualnych SMP-FT łącznie na hoście ESXi lub w klastrze.

Virtual Hardware w wersji 18: ESXi Update 7.0 Update 1 wprowadza virtual hardware w wersji 18, aby umożliwić obsługę maszyn wirtualnych z wyższymi maksymalnymi zasobami oraz:

-Bezpieczna szyfrowana wirtualizacja – stan zaszyfrowany (SEV-ES)

-Natywne punkty końcowe wirtualnego zdalnego bezpośredniego dostępu do pamięci (vRDMA) Tryb graficzny EVC (vSGA).

Zwiększone limity zasobów dla maszyn wirtualnych i ulepszenia wydajności: Dzięki ESXi 7.0 Update 1 możesz tworzyć maszyny wirtualne z trzykrotnie większą liczbą wirtualnych procesorów i czterokrotnie większą ilością pamięci, aby umożliwić aplikacjom z większą pamięcią i obciążeniem procesora skalowanie w sposób niemal liniowy, porównywalny z fizycznym systemem.

Udoskonalenia wydajności w ESXi, które obsługują maszyny wirtualne w większej skali, obejmują poszerzenie adresu fizycznego, optymalizację przestrzeni adresowej, lepszą świadomość NUMA dla maszyn wirtualnych gości i bardziej skalowalne techniki synchronizacji. vSphere vMotion jest również zoptymalizowany do pracy z większymi konfiguracjami maszyn wirtualnych. Hosty ESXi z procesorami AMD mogą obsługiwać maszyny wirtualne z dwukrotnie większą liczbą procesorów wirtualnych, 256 i do 8 TB pamięci RAM. Obsługa pamięci trwałej (PMEM) zwiększa się dwukrotnie do 12 TB z 6 TB zarówno dla trybu pamięci, jak i trybu App Direct.

Rozwiązane problemy:

ESXi_7.0.1-0.0.16850804

Patch Category General
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMware_bootbank_esx-xserver_7.0.1-0.0.16850804
  • VMware_bootbank_cpu-microcode_7.0.1-0.0.16850804
  • VMware_bootbank_esx-dvfilter-generic-fastpath_7.0.1-0.0.16850804
  • VMware_bootbank_esx-base_7.0.1-0.0.16850804
  • VMware_bootbank_vsan_7.0.1-0.0.16850804
  • VMware_bootbank_esx-ui_1.34.4-0.0.16850804
  • VMware_bootbank_crx_7.0.1-0.0.16850804
  • VMware_bootbank_vsanhealth_7.0.1-0.0.16850804
  • VMware_bootbank_native-misc-drivers_7.0.1-0.0.16850804
  • VMware_bootbank_vdfs_7.0.1-0.0.16850804
  • VMware_bootbank_gc_7.0.1-0.0.16850804
PRs Fixed  2086530, 2226245, 2495261, 2156103
CVE numbers N/A

The ESXi and esx-update bulletins are dependent on each other. Always include both in a single ESXi host patch baseline or include the rollup bulletin in the baseline to avoid failure during host patching.

Updates the esx-dvfilter-generic-fastpath, vsanhealth, esx-ui, vdfs, vsan, esx-base, crx, native-misc-drivers, esx-xserver, gc and cpu-microcode VIBs to resolve the following issues:

  • PR 2086530: Setting the loglevel for the nvme_pcie driver fails with an errorWhen you set the loglevel for the nvme_pcie driver with the command esxcli nvme driver loglevel set -l <log level>, the action fails with the error message:Failed to set log level 0x2.This command was retained for compatibility consideration with the NVMe driver, but it is not supported for the nvme_pcie driver.

    This issue is resolved in this release. You can modify the log level by using the VMkernel system information shell.

  • PR 2226245: When a host profile is copied from an ESXi host or a host profile is edited, the user input values are lostSome of the host profile keys are generated from hash calculation even when explicit rules for key generation are provided. As a result, when you copy settings from a host or edit a host profile, the user input values in the answer file are lost.This issue is resolved in this release.
  • PR 2495261: Checking the compliance state of an ESXi 7.0 host against a host profile with version 6.5 or 6.7 results in an error for vmhba and vmrdma devicesWhen checking the compliance of a ESXi 7.0 host that uses a nmlx5_core or nvme_pcie driver against a host profile with version 6.5 or 6.7, you might observe the following errors, where address1 and address2 are specific to the affected system.
    • A vmhba device with bus type logical, address1 is not present on your host.
    • A vmrdma device with bus type logical, address2 is not present on your host.

    The error is due to a mismatch between device addresses generated by the nmlx5_core or nvme_pcie driver in ESXi version 7.0 and earlier.

    This issue is resolved in this release.

  • PR 2156103: SNMP dynamic firewall ruleset is modified by Host Profiles during a remediation processThe SNMP firewall ruleset is a dynamic state, which is handled during runtime. When a host profile is applied, the configuration of the ruleset is managed simultaneously by Host Profiles and SNMP, which can modify the firewall settings unexpectedly.This issue is resolved in this release.

esx-update_7.0.1-0.0.16850804

Patch Category General
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs I

ncluded

  • VMware_bootbank_loadesx_7.0.1-0.0.16850804
  • VMware_bootbank_esx-update_7.0.1-0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the loadesx and esx-update VIBs.

VMware-nvmxnet3-ens_2.0.0.22-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_nvmxnet3-ens_2.0.0.22-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the  nvmxnet3-ens VIB.Mellanox-nmlx4_3.19.16.8-2vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_nmlx4-core_3.19.16.8-2vmw.701.0.0.16850804
  • VMW_bootbank_nmlx4-rdma_3.19.16.8-2vmw.701.0.0.16850804
  • VMW_bootbank_nmlx4-en_3.19.16.8-2vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the nmlx4-core, nmlx4-rdma, and nmlx4 VIBs.

Broadcom-elxiscsi_12.0.1200.0-2vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_elxiscsi_12.0.1200.0-2vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the elxiscsi VIB.

Cisco-nfnic_4.0.0.44-2vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_nfnic_4.0.0.44-2vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the nfnic VIB.

MRVL-E3-Ethernet_1.1.0.11-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_qflge_1.1.0.11-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the qflge ​VIB.

VMware-icen_1.0.0.9-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_icen_1.0.0.9-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the icen ​VIB.

Intel-ne1000_0.8.4-11vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required No
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_ne1000_0.8.4-11vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the ne1000 ​​VIB.

Intel-Volume-Mgmt-Device_2.0.0.1055-5vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required No
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_iavmd_2.0.0.1055-5vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the iavmd ​​VIB.

Broadcom-ELX-brcmnvmefc_12.6.278.10-3vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_brcmnvmefc_12.6.278.10-3vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the brcmnvmefc ​​VIB.

Broadcom-ntg3_4.1.5.0-0vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_ntg3_4.1.5.0-0vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the ntg3 ​​VIB.

HPE-hpv2-hpsa-plugin_1.0.0-3vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required No
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMware_bootbank_lsuv2-hpv2-hpsa-plugin_1.0.0-3vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the lsuv2-hpv2-hpsa-plugin ​​VIB.

Broadcom-lsi-msgpt3_17.00.10.00-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_lsi-msgpt3_17.00.10.00-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the lsi-msgpt3 ​​VIB.

Intel-SCU-rste_2.0.2.0088-7vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_rste_2.0.2.0088-7vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the rste VIB.

Intel-ixgben_1.7.1.28-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_ixgben_1.7.1.28-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the ixgben VIB.

Intel-NVMe-Vol-Mgmt-Dev-Plugin_1.0.0-2vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required No
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMware_bootbank_lsuv2-intelv2-nvme-vmd-plugin_1.0.0-2vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the lsuv2-intelv2-nvme-vmd-plugin VIB.

VMware-iser_1.1.0.1-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_iser_1.1.0.1-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the iser VIB.

Broadcom-lpnic_11.4.62.0-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_lpnic_11.4.62.0-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the lpnic VIB.

VMware-NVMe-PCIe_1.2.3.9-2vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_nvme-pcie_1.2.3.9-2vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the nvme-pcie ​VIB.

Microchip-smartpqi_70.4000.0.100-3vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_smartpqi_70.4000.0.100-3vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the smartpqi ​VIB.

VMware-NVMeoF-RDMA_1.0.1.2-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_nvmerdma_1.0.1.2-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the nvmerdma ​VIB.

VMware-oem-lenovo-plugin_1.0.0-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required No
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMware_bootbank_lsuv2-oem-lenovo-plugin_1.0.0-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the lsuv2-oem-lenovo-plugin ​​VIB.

Intel-igbn_0.1.1.0-7vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_igbn_0.1.1.0-7vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the igbn ​​VIB.

VMware-vmkata_0.1-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_vmkata_0.1-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the vmkata ​​VIB.

VMware-vmkfcoe_1.0.0.2-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_vmkfcoe_1.0.0.2-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the vmkfcoe ​​VIB.

VMware-oem-hp-plugin_1.0.0-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required No
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMware_bootbank_lsuv2-oem-hp-plugin_1.0.0-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the lsuv2-oem-hp-plugin ​​​VIB.

Cisco-nenic_1.0.29.0-2vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_nenic_1.0.29.0-2vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the nenic ​​​VIB.

Broadcom-ELX-brcmfcoe_12.0.1500.0-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_brcmfcoe_12.0.1500.0-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the brcmfcoe ​​​VIB.

HPE-nhpsa_70.0050.0.100-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required No
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_nhpsa_70.0050.0.100-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the nhpsa ​​​​VIB.

Mellanox-nmlx5_4.19.16.8-2vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_nmlx5-rdma_4.19.16.8-2vmw.701.0.0.16850804
  • VMW_bootbank_nmlx5-core_4.19.16.8-2vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the nmlx5-rdma and nmlx5-core ​​​​VIBs.

Broadcom-ELX-IMA-plugin_12.0.1200.0-3vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMware_bootbank_elx-esx-libelxima.so_12.0.1200.0-3vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the elx-esx-libelxima.so​ ​​​​​VIB.

Microchip-smartpqiv2-plugin_1.0.0-4vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required No
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMware_bootbank_lsuv2-smartpqiv2-plugin_1.0.0-4vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the lsuv2-smartpqiv2-plugin​​ ​​​​​VIB.

VMware-nvme-pcie-plugin_1.0.0-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required No
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMware_bootbank_lsuv2-nvme-pcie-plugin_1.0.0-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the lsuv2-nvme-pcie-plugin​​ ​​​​​VIB.

MRVL-E4-CNA-Driver-Bundle_1.0.0.0-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_qedentv_3.40.3.0-12vmw.701.0.0.16850804
  • VMW_bootbank_qedrntv_3.40.4.0-12vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the qedentv ​​​​​VIB.

VMware-oem-dell-plugin_1.0.0-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required No
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMware_bootbank_lsuv2-oem-dell-plugin_1.0.0-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the lsuv2-oem-dell-plugin ​​​​​VIB.

VMware-nvmxnet3_2.0.0.30-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_nvmxnet3_2.0.0.30-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the nvmxnet3 ​​​​​VIB.

VMware-ahci_2.0.5-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_vmw-ahci_2.0.5-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the vmw-ahci ​​​​​VIB.

Intel-i40iwn_1.1.2.6-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_i40iwn_1.1.2.6-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the i40iwn​ ​​​​​VIB.

Broadcom-bnxt-Net-RoCE_216.0.0.0-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_bnxtnet_216.0.50.0-16vmw.701.0.0.16850804
  • VMW_bootbank_bnxtroce_216.0.58.0-7vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the bnxtnet​ and bnxtroce ​​​​​VIBs.

Broadcom-lsiv2-drivers-plugin_1.0.0-4vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required No
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMware_bootbank_lsuv2-lsiv2-drivers-plugin_1.0.0-4vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the lsuv2-lsiv2-drivers-plugin​ ​​​​​VIB.

Micron-mtip32xx-native_3.9.8-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_mtip32xx-native_3.9.8-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the mtip32xx-native​ ​​​​​VIB.

VMware-nvme-plugin_1.2.0.38-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required No
Virtual Machine Migration or Shutdown Required No
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMware_bootbank_vmware-esx-esxcli-nvme-plugin_1.2.0.38-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the vmware-esx-esxcli-nvme-plugin​ ​​​​​VIB.

MRVL-QLogic-FC_4.0.3.0-17vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMware_bootbank_qlnativefc_4.0.3.0-17vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the qlnativefc​ ​​​​​VIB.

VMware-vmkusb_0.1-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_vmkusb_0.1-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the vmkusb​ ​​​​​VIB.

VMware-VM-Tools_11.1.1.16303738-16850804

Patch Category General
Patch Severity Important
Host Reboot Required No
Virtual Machine Migration or Shutdown Required No
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMware_locker_tools-light_11.1.1.16303738-16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the tools-light​​ ​​​​​VIB.

Solarflare-NIC_2.4.0.0010-15vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required No
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_sfvmk_2.4.0.0010-15vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the sfvmk​​ ​​​​​​VIB.

Intel-i40en_1.8.1.123-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_i40en_1.8.1.123-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the i40en​​ ​​​​​​VIB.

Broadcom-ELX-lpfc_12.6.278.10-8vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_lpfc_12.6.278.10-8vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the lpfc​​ ​​​​​​VIB.

MRVL-E3-Ethernet-iSCSI-FCoE_1.0.0.0-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_qcnic_1.0.15.0-10vmw.701.0.0.16850804
  • VMW_bootbank_qfle3f_1.0.51.0-14vmw.701.0.0.16850804
  • VMW_bootbank_qfle3i_1.0.15.0-9vmw.701.0.0.16850804
  • VMW_bootbank_qfle3_1.0.67.0-9vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the qcnic, qfle3f, qfle3i, and qfle3 ​​​​​​VIBs.

Broadcom-lsi-msgpt35_13.00.13.00-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_lsi-msgpt35_13.00.13.00-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the lsi-msgpt35​ ​​​​​​VIB.

VMware-pvscsi_0.1-2vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_pvscsi_0.1-2vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the pvscsi ​​​​​​VIB.

Broadcom-lsi-msgpt2_20.00.06.00-2vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_lsi-msgpt2_20.00.06.00-2vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the lsi-msgpt2 ​​​​​​VIB.

Broadcom-elxnet_12.0.1250.0-5vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_elxnet_12.0.1250.0-5vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the elxnet ​​​​​​VIB.

Broadcom-lsi-mr3_7.712.51.00-1vmw.701.0.0.16850804

Patch Category Enhancement
Patch Severity Important
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMW_bootbank_lsi-mr3_7.712.51.00-1vmw.701.0.0.16850804
PRs Fixed  N/A
CVE numbers N/A

Updates the lsi-mr3 ​​​​​​VIB.

Znane Problemy:

Networking Issues

  • One or more I/O devices do not generate interrupts when the AMD IOMMU is in useIf the I/O devices on your ESXi host provide more than a total of 512 distinct interrupt sources, some sources are erroneously assigned an interrupt-remapping table entry (IRTE) index in the AMD IOMMU that is greater than the maximum value. Interrupts from such a source are lost, so the corresponding I/O device behaves as if interrupts are disabled.Workaround: Use the ESXCLI command esxcli system settings kernel set -s iovDisableIR -v true to disable the AMD IOMMU interrupt remapper. Reboot the ESXi host so that the command takes effect.

Miscellaneous Issues

  • If you run the ESXCLI command to unload the firewall module, the hostd service fails and ESXi hosts lose connectivityIf you automate the firewall configuration in an environment that includes multiple ESXi hosts, and run the ESXCLI command esxcli network firewall unload that destroys filters and unloads the firewall module, the hostd service fails and ESXi hosts lose connectivity.Workaround: Unloading the firewall module is not recommended at any time. If you must unload the firewall module, use the following steps:
    1. Stop the hostd service by using the command:
      /etc/init.d/hostd stop.
    2. Unload the firewall module by using the command:
      esxcli network firewall unload.
    3. Perform the required operations.
    4. Load the firewall module by using the command:
      esxcli network firewall load.
    5. Start the hostd service by using the command:
      /etc/init.d/hostd start.
  • vSphere Storage vMotion operations might fail in a vSAN environment due to an unauthenticated session of the Network File Copy (NFC) managerMigrations to a vSAN datastore by using vSphere Storage vMotion of virtual machines that have at least one snapshot and more than one virtual disk with different storage policy might fail. The issue occurs due to an unauthenticated session of the NFC manager because the Simple Object Access Protocol (SOAP) body exceeds the allowed size.Workaround: First migrate the VM home namespace and just one of the virtual disks. After the operation completes, perform a disk only migration of the remaining 2 disks.
  • Changes in the properties and attributes of the devices and storage on an ESXi host might not persist after a rebootIf the device discovery routine during a reboot of an ESXi host times out, the jumpstart plug-in might not receive all configuration changes of the devices and storage from all the registered devices on the host. As a result, the process might restore the properties of some devices or storage to the default values after the reboot.Workaround: Manually restore the changes in the properties of the affected device or storage.
  • If you use a beta build of ESXi 7.0, ESXi hosts might fail with a purple diagnostic screen during some lifecycle operationsIf you use a beta build of ESXi 7.0, ESXi hosts might fail with a purple diagnostic screen during some lifecycle operations such as unloading a driver or switching between ENS mode and native driver mode. For example, if you try to change the ENS mode, in the backtrace you see an error message similar to: case ENS::INTERRUPT::NoVM_DeviceStateWithGracefulRemove hit BlueScreen: ASSERT bora/vmkernel/main/dlmalloc.c:2733 This issue is specific for beta builds and does not affect release builds such as ESXi 7.0.Workaround: Update to ESXi 7.0 GA.

Storage Issues

  • A VMFS datastore backed by an NVMe over Fabrics namespace or device might become permanently inaccessible after recovering from an APD or PDL failureIf a VMFS datastore on an ESXi host is backed by an NVMe over Fabrics namespace or device, in case of an all paths down (APD) or permanent device loss (PDL) failure, the datastore might be inaccessible even after recovery. You cannot access the datastore from either the ESXi host or the vCenter Server system.Workaround: To recover from this state, perform a rescan on a host or cluster level. For more information, see Perform Storage Rescan.

Virtual Machines Management Issues

  • Virtual machines with enabled AMD Secure Encrypted Virtualization-Encrypted State (SEV-ES) cannot create Virtual Machine Communication Interface (VMCI) socketsPerformance and functionality of features that require VMCI might be affected on virtual machines with enabled AMD SEV-ES, because such virtual machines cannot create VMCI sockets.Workaround: None.

Auto Deploy Issues

  • You cannot PXE boot an ESXi host by using vSphere Auto Deploy due to a network errorFor ESXi hosts with Emulex and Qlogic host bus adapters (HBA), attempts to PXE boot the host by using vSphere Auto Deploy might fail due to a network error. For some Emulex adapters, in the PXE Boot console you see a message such as:
    Could not open net0: Input/output error http://ipxe.org/1d6a4a98'
    Network error encountered while PXE booting.
    Scanning the local disk for cached image.
    If no image is found, the system will reboot in 20 seconds ……
    Could not boot. No such device (http://ipxe.org/2c048087)
    Emulex HBA adapters that persistently face the issue are:

    • HPE StoreFabric CN1200E-T 10Gb Converged Network Adapter
    • HPE StoreFabric CN1200E 10Gb Converged Network Adapter
    • HP FlexFabric 20Gb 2-port 650FLB Adapter
    • HP FlexFabric 20Gb 2-port 650M Adapter

    For ESXi hosts with QLogic HBAs, attempts to PXE boot the host by using vSphere Auto Deploy do not always fail.

    If the ESX host encounters the issue, in the PXE Boot console you see a message such as:
    Configuring (net0 f4:03:43:b4:88:d0)......
    No configuration methods succeeded (http://ipxe.org/040ee186)
    Network error encountered while PXE booting.

    The affected Qlogic HBA adapter is HP Ethernet 10Gb 2-port 530T.

    Workaround: None

Installation, Upgrade and Migration Issues

  • Installation of 7.0 Update 1 drivers on ESXi 7.0 hosts might failYou cannot install drivers applicable to ESXi 7.0 Update 1 on hosts that run ESXi 7.0 or 7.0b.
    The operation fails with an error, such as:
    VMW_bootbank_qedrntv_3.40.4.0-12vmw.701.0.0.xxxxxxx requires vmkapi_2_7_0_0, but the requirement cannot be satisfied within the ImageProfile. ​
    Please refer to the log file for more details.
    Workaround: Update the ESXi host to 7.0 Update 1. Retry the driver installation.

Notatki producenta-KLIK

Pozdrawiamy,

Zespół B&B
Bezpieczeństwo w biznesie

Post Views: 1 969

7.0U1 VMware ESXi 7.0U1 vmwware

Poprzedni artykułFortiAP-U 6.0.4Następny artykuł VMware vCenter Server 7.0U1a

Najnowsze

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

Kategorie

  • Acronis
  • Aktualności
  • Bez kategorii
  • ESET
  • F-Secure
  • FortiAnalyzer
  • FortiAP
  • FortiAuthenticator
  • FortiClient
  • FortiDeceptor
  • FORTIGATE
  • FORTIMAIL
  • FortiManager
  • FortiNAC
  • FortiSIEM
  • FORTISWITCH
  • FortiWeb
  • NAKIVO
  • Proget
  • Qnap
  • Stormshield
  • Szkolenia
  • Veeam
  • VMware
  • WithSecure

Tagi

6.0.6 6.2.2 6.2.7 6.4.0 6.4.4 6.4.5 6.4.8 7.0.0 7.0.2 7.0.5 7.2.0 7.2.2 ems Eset eset endpoint antivirus eset endpoint security ESET Inspect ESET Protect ESET Protect Cloud F-Secure FMG FortiAnalyzer forti analyzer FortiAP fortiap-w2 FortiAuthenticator FortiClient FortiClientEMS forticlient ems FortiGate FortiMail FortiManager FortiNAC Fortinet FortiOS FortiSIEM FortiSwitch FortiWeb vCenter vCenter Server VMware VMware ESXi vmware esxi 8.0 vmware vcenter VMware vCenter Server

MENU

  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

BLOG TECHNICZNY

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

KONTAKT

biuro@b-and-b.plhttps://www.b-and-b.pl
8:00-16:00
RODO | POLITYKA PRYWATNOŚCI
OGÓLNE WARUNKI REKLAMACJI

BEZPIECZEŃSTWO W BIZNESIE 2025 - wszystkie prawa zastrzeżone

MENU

  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

BLOG TECHNICZNY

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

Kontakt

+48 500-413-313
biuro@b-and-b.pl
8:00-16:00
Add new entry logo

Korzystamy z plików cookies lub podobnych technologii, by lepiej dopasować treści na stronie do Twoich potrzeb. W każdej chwili możesz zmienić ustawienia cookies. Polityka prywatności

Akceptuję Odmów
Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages.
  • Always Active
    Necessary
    Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

  • Marketing
    Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

  • Analytics
    Analytics cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

  • Preferences
    Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.

  • Unclassified
    Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.