Simplicity Across Clouds Is Rare
91% of executives are looking to improve “consistency across [their] public cloud environments."
Applications Need to Be Modernized
68% of developers want to expand use of modern application frameworks, APIs and services.
Distributed Work Models Are Here to Stay
72% of enterprise employees are working from non-traditional environments.
Security Is a Top-Down Concern
Risk related to security, data and privacy issues remains the #1 multi-cloud challenge.
Get on a Faster Path to Prod
Build and deploy quickly and securely on any public cloud or on-premises Kubernetes cluster.
Simplify Kubernetes Operations
Build and operate a secure, multi-cloud container infrastructure at scale.
Pair with App Development Experts
Unlock value by modernizing your existing apps and building innovative new products.
Connect and Run with Confidence
Reduce time-to-value, lower costs, and enhance security while modernizing your private and public cloud infrastructure.
Enhance Digital Experiences
Securely, reliably, and optimally connect applications in the cloud and at the edge to deliver unique experiences.
Run enterprise apps at scale with a consistent cloud infrastructure across public clouds, data centers and edge environments.
Deliver an Engaging Experience
Put employees first with device choice, flexibility, and seamless, consistent, high-quality experiences.
Secure Today’s Anywhere Workspace
Ease the move to Zero Trust with situational intelligence and connected control points.
Accelerate IT Modernization
Manage to outcomes — not tasks — with intelligent compliance, workflow and performance management.
Secure & Connect Workloads
Operationalize consistent security and networking across apps, users, and entities with transparency built into our tools.
Protect APIs — the New Endpoints
Increase app velocity and centrally manage, secure, connect, and govern your clusters no matter where they reside.
Get built-in threat intelligence spanning users, endpoints and networks to evolve your protection in a dynamic landscape.
Deliver security and networking as a built-in distributed service across users, apps, devices, and workloads in any cloud.
Work with a VMware Partner
Partners deliver outcomes with their expertise and VMware technology, creating exceptional value for our mutual customers.
Become a Partner
Together with our partners, VMware is building the new multi-cloud ecosystem positioned to become essential to our customers.
VMware product updates address a critical glibc security vulnerability
2. Relevant Releases
ESXi 6.0 without patch ESXi600-201602401-SG
ESXi 5.5 without patch ESXi550-201602401-SG
VMware virtual appliances
3. Problem Description
a. glibc update for multiple products.
The glibc library has been updated in multiple products to resolve a stack buffer overflow present in the glibc getaddrinfo function.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2015-7547.
VMware products have been grouped into the following four categories:
I) ESXi and ESX Hypervisor
Versions of ESXi and ESX prior to 5.5 are not affected because they do not ship with a vulnerable version of glibc. ESXi 5.5 and ESXi 6.0 ship with a vulnerable version of glibc and are affected.
See table 1 for remediation for ESXi 5.5 and ESXi 6.0.
II) Windows-based products
Windows-based products, including all versions of vCenter Server running on Windows, are not affected.
III) VMware virtual appliances
VMware virtual appliances ship with a vulnerable version of glibc and are affected.
See table 2 for remediation for appliances.
IV) Products that run on Linux
VMware products that run on Linux (excluding virtual appliances) might use a vulnerable version of glibc as part of the base operating system. If the operating system has a vulnerable version of glibc, VMware recommends that customers contact their operating system vendor for resolution.
Workarounds are available for several virtual appliances. These are documented in VMware KB article 2144032.
VMware recommends customers evaluate and deploy patches for affected products in Table 1 and 2 below as these patches become available. In case patches are not available, customers are advised to deploy the workaround.
Column 4 of the following tables lists the action required to remediate the vulnerability in each release, if a solution is available.
Table 1 - ESXi
VMware virtual appliances
Refer to VMware KB article 2144032
VMware Knowledge Base article 2144032
6. Change Log
Initial security advisory in conjunction with the release of ESXi 5.5 patches and patches for virtual appliances as documented in VMware Knowledge Base article 2144032 on 2016-02-22.
Updated security advisory in conjunction with the release of ESXi 6.0 patches on 2016-02-23.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org
E-mail: security at vmware.com
PGP key at: https://kb.vmware.com/kb/1055
VMware Security Advisories
Consolidated list of VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
Copyright 2016 VMware Inc. All rights reserved.