You can upgrade to VMware Cloud Foundation 3.10.1.2 from a 3.10.1.1 deployment, or you can use the skip-level upgrade tool to upgrade to VMware Cloud Foundation 3.10.1.2 from versions earlier than 3.10.1.1. For upgrade information, refer to the VMware Cloud Foundation Upgrade Guide.
VMware Cloud Foundation 3.10.1.2 contains the following BOM updates:
Software Component |
Version |
Date |
Build Number |
SDDC Manager |
3.10.1.2 |
24 NOV 2020 |
17206767 |
VMware ESXi |
ESXi670-202011002 |
19 NOV 2020 |
17167734 |
VMware vCenter Server Appliance |
6.7 U3l |
19 NOV 2020 |
17138064 |
SDDC Manager 3.10.1.2 addresses the following issue:
SDDC Manager 3.10.1.2 contains security fixes for Photon OS packages PHSA-2020-3.0-0140 to PHSA-2020-3.0-0162 published here: https://github.com/vmware/photon/wiki/Security-Advisories-3.
ESXi670-202010002 addresses the following issues:
OpenSLP as used in ESXi has a use-after-free issue. This issue might allow a malicious actor with network access to port 427 on an ESXi host to trigger a use-after-free in the OpenSLP service resulting in remote code execution. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2020-3992 to this issue. For more information, see VMware Security Advisory VMSA-2020-0023.1.
VMware ESXi contains a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine might exploit this issue to execute code as the virtual machine's VMX process running on the host. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2020-4004 to this issue. For more information, see VMSA-2020-0026.
VMware ESXi contains a privilege-escalation vulnerability that exists in the way certain system calls are being managed. A malicious actor with privileges within the VMX process only, might escalate their privileges on the affected system. Successful exploitation of this issue is only possible when chained with another vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2020-4005 to this issue. For more information, see VMSA-2020-0026.
For information about other resolved issues, see the release notes for VMware ESXi 6.7, Patch Release ESXi670-202011002.
See the VMware vCenter Server 6.7 Update 3l Release Notes for information about the issues resolved in that release.