Release Date: JUN 14, 2022
What's in the Release Notes
The release notes cover the following topics:
This release includes mitigations for CVE-2022-21123, CVE-2022-21125, and CVE-2022-21166. For more information on these vulnerabilities including impacted product suites and release lines, please see: VMSA-2022-0016.
Build Details
Download Filename: | ESXi670-202206001.zip |
Build: | 19898906 |
Download Size: | 464.1 MB |
md5sum: | 94166edbdb7c7dcf8aad98d0b1555f33 |
sha256checksum: | e4d1a4ef289d9b94565e6b01255954fe258a2c0d7a93de9c195eb88fec1b4d4c |
Host Reboot Required: | Yes |
Virtual Machine Migration or Shutdown Required: | Yes |
Bulletins
Bulletin ID | Category | Severity |
ESXi670-202206401-BG | Bugfix | Critical |
ESXi670-202206402-BG | Bugfix | Important |
ESXi670-202206101-SG | Security | Important |
ESXi670-202206102-SG | Security | Important |
ESXi670-202206103-SG | Security | Important |
Rollup Bulletin
This rollup bulletin contains the latest VIBs with all the fixes since the initial release of ESXi 6.7.
Bulletin ID | Category | Severity |
ESXi670-202206001 | Bugfix | Critical |
IMPORTANT: For clusters using VMware vSAN, you must first upgrade the vCenter Server system. Upgrading only the ESXi hosts is not supported.
Before an upgrade, always verify in the VMware Product Interoperability Matrix compatible upgrade paths from earlier versions of ESXi, vCenter Server and vSAN to the current version.
Image Profiles
VMware patch and update releases contain general and critical image profiles. Application of the general release image profile applies to new bug fixes.
Image Profile Name |
ESXi-6.7.0-20220604001-standard |
ESXi-6.7.0-20220604001-no-tools |
ESXi-6.7.0-20220601001s-standard |
ESXi-6.7.0-20220601001s-no-tools |
For more information about the individual bulletins, see the Product Patches page and the Resolved Issues section.
Patch Download and Installation
The typical way to apply patches to ESXi hosts is by using the VMware vSphere Update Manager. For details, see the About Installing and Administering VMware vSphere Update Manager.
ESXi hosts can be updated by manually downloading the patch ZIP file from VMware Customer Connect. From the Select a Product drop-down menu, select ESXi (Embedded and Installable) and from the Select a Version drop-down menu, select 6.7.0. Install VIBs by using the esxcli software vib update
command. Additionally, you can update the system by using the image profile and the esxcli software profile update
command.
For more information, see the vSphere Command-Line Interface Concepts and Examples and the vSphere Upgrade Guide.
Resolved Issues
The resolved issues are grouped as follows.
- ESXi670-202206401-BG
- ESXi670-202206402-BG
- ESXi670-202206101-SG
- ESXi670-202206102-SG
- ESXi670-202206103-SG
- ESXi-6.7.0-20220604001-standard
- ESXi-6.7.0-20220604001-no-tools
- ESXi-6.7.0-20220601001s-standard
- ESXi-6.7.0-20220601001s-no-tools
Patch Category | Bugfix |
Patch Severity | Critical |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | 2891724, 2966100, 2888739, 2919514, 2931457, 2916330, 2819598, 2931040, 2911524, 2911321, 2919813, 2905924, 2904032 |
CVE numbers | N/A |
Updates esx-base, esx-update, vsan,
and vsanhealth
VIBs to resolve the following issues:
- PR 2891724: You might see spikes in the latency performance metrics after a virtual machine disk snapshot is created
After you create a virtual machine disk snapshot, you might see latency spikes in the vSphere performance charts. Such unusual spikes are due to the recreation of some internal system objects and the restart of the latency performance counters in the storage subsystem.
This issue is resolved in this release. The fix prevents false latency alarms after virtual machine disk snapshots.
- PR 2966100: Failed asynchronous tasks run by a VASA provider might cause the VMX or hostd services to fail as well
The response of certain asynchronous task run by a VASA provider, such as
prepareToSnapshot
andcreateVirtualVolume
, might not return sufficient error details for the task in case of failure. As a result, the VMX or hostd services might fail intermittently with a core dump.This issue is resolved in this release.
- PR 2888739: You cannot create a host profile from an ESXi host that uses a hardware iSCSI adapter with pseudo NICs
If a hardware iSCSI adapter on an ESXi host in your environment uses pseudo NICs, you might not be able to create a host profile from such a host since pseudo NICs do not have the required PCI address and vendor name for a profile.
This issue is resolved in this release. For pseudo NICs, the fix removes the requirement for PCI address and PCI vendor name values.
- PR 2919514: LUN trespasses might occur on Dell EMC Unity arrays upon shutdown or booting of ESXi 6.7 hosts
After a controlled shutdown or booting of any server in a cluster of ESXi servers attached to a Dell EMC Unity array, all LUNs to which that server has access might trespass to one storage processor on the array. As a result, performance of the other ESXi servers accessing the LUNs aggravates.
This issue is resolved in this release. The fix adds a check before activating the last path on the target during the shutdown phase to prevent LUN trespassing.
- PR 2931457: The vSphere Replication service fails to start on a vCenter Server system due to error in the installation of the vmware-hbr-agent VIB
You might not be able to start the vSphere Replication service on a vCenter Server system and see errors such as
Error connecting to proxy: [<FQDN of vCenter Server>, '80']
in the/var/run/log/esxupdate.log
on ESXi hosts. The issue occurs when the vSphere Replication Management Server fails to install thevmware-hbr-agent
VIB on all ESXi hosts due to an incorrect proxy request header sent by ESXi.This issue is resolved in this release.
- PR 2916330: Many simultaneous ESXCLI calls might cause a deadlock in the hostd service
In certain environments, more than 15 parallel ESXCLI calls might cause a deadlock in the hostd service. As a result, hostd becomes intermittently unresponsive on different ESXi hosts.
This issue is resolved in this release.
- PR 2819598: A routine operation to extend a disk on a powered on VM might fail with an invalid state error
A routine operation to extend a disk on a powered on VM might fail with a message such as
Error: The attempted operation cannot be performed in the current state ("Powered on")
. The issue occurs in rare cases, when the hostd service might wrongly interpret a simple disk extend request as a request to change the virtual disk backing. As a result, the request fails with anInvalidPowerState
error.This issue is resolved in this release.
- PR 2931040: Virtual machines on NFSv4.1 datastores become unresponsive for few seconds during storage failover
In rare cases, when an NFSv4.1 server returns a transient error during storage failover, you might see virtual machines to become unresponsive for 10 seconds before the operation restarts.
This issue is resolved in this release. The fix reduces wait time for recovery during storage failover.
- PR 2911524: Multiple ESXi hosts drop syslog messages
In rare cases, the vmsyslog service might rotate logs in an older version of the
/etc/vmsyslog.conf
file. As a result, you see multiple ESXi hosts drop syslog messages.This issue is resolved in this release.
- PR 2911321: You see status Unknown for sensors of type System Event in the hardware health monitoring screen in the vSphere Client
The hardware health module of ESXi might fail to decode some sensors of the type System Event when a physical server is rebranded. As a result, in the vSphere Client you see status Unknown for sensors of type System Event under Monitor > Hardware Health.
This issue is resolved in this release.
- PR 2919813: If a virtual machine has Changed Block Tracking (CBT) enabled, snapshot operations might take longer than usual
If a virtual machine has CBT enabled, virtual machines might become unresponsive longer than usual during snapshot operations while VMFS allocates resources to create the change tracking file for the delta disk.
This issue is resolved in this release.
- PR 2905924: An ESXi host might fail with a purple diagnostic screen due to a race condition in container ports
Due to a rare race condition, when a container port tries to re-acquire a lock it already holds, an ESXi host might fail with a purple diagnostic screen while virtual machines with container ports power off or migrate by using vSphere vMotion. The issue occurs due to duplicating port IDs.
This issue is resolved in this release.
- PR 2904032: ESXi hosts might fail with a purple diagnostic screen when I/O operations run on a software iSCSI adapter
I/O operations on a software iSCSI adapter might cause a rare race condition inside the
iscsi_vmk
driver. As a result, ESXi hosts might intermittently fail with a purple diagnostic screen.This issue is resolved in this release.
Patch Category | Bugfix |
Patch Severity | Important |
Host Reboot Required | No |
Virtual Machine Migration or Shutdown Required | No |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | 2912214 |
CVE numbers | N/A |
Updates the esx-xserver
VIB to resolve the following issue:
- PR 2912214: The hostd service might repeatedly fail on virtual machines with serial devices with no fileName property and serial.autodetect property set to FALSE
In rare cases, a serial device on a virtual machine might not have a
serial<N>.fileName
property and theserial<N>.autodetect
property to be set toFALSE
. As a result, the hostd service might repeatedly fail.This issue is resolved in this release.
Patch Category | Security |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | 2886362, 2916437, 2920288, 2932873, 2932877, 2932879, 2933658, 2936545, 2942580 |
CVE numbers | CVE-2022-21123, CVE-2022-21125, CVE-2022-21166, CVE-2004-0230, CVE-2020-7451, CVE-2015-2923, CVE-2015-5358, CVE-2013-3077, CVE-2015-1414, CVE-2018-6918, CVE-2020-7469, CVE-2019-5611, CVE-2020-7457, CVE-2018-6916, CVE-2019-5608 |
Updates esx-base, esx-update, vsan,
and vsanhealth
VIBs to resolve the following issues:
This release includes mitigations for CVE-2022-21123, CVE-2022-21125, and CVE-2022-21166. For more information on these vulnerabilities including impacted product suites and release lines, please see: VMSA-2022-0016.
- ESXi670-202206001 delivers the following security updates:
- The Expat XML parser is updated to version 2.4.7.
- The SQLite database is updated to version 3.37.2.
- cURL is updated to version 7.81.0.
- The OpenSSL package is updated to version openssl-1.0.2zd.
- The ESXi userworld libxml2 library is updated to version 2.9.13.
- This release resolves CVE-2004-0230. VMware has evaluated the severity of this issue to be in the low severity range with a maximum CVSSv3 base score of 3.7.
- This release resolves CVE-2020-7451. VMware has evaluated the severity of this issue to be in the moderate severity range with a maximum CVSSv3 base score of 5.3.
- This release resolves CVE-2015-2923. VMware has evaluated the severity of this issue to be in the moderate severity range with a maximum CVSSv3 base score of 6.5.
- This release resolves CVE-2015-5358. VMware has evaluated the severity of this issue to be in the moderate severity range with a maximum CVSSv3 base score of 6.5.
- This release resolves CVE-2013-3077. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.0.
- This release resolves CVE-2015-1414. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.5.
- This release resolves CVE-2018-6918. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.5.
- This release resolves CVE-2020-7469. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.5.
- This release resolves CVE-2019-5611. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.5.
- This release resolves CVE-2020-7457. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.8.
- This release resolves CVE-2018-6916. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 8.1.
- This release resolves CVE-2019-5608. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 8.1.
- PR 2819495: ESXi hosts might fail with a purple diagnostic screen when I/O operations run on a software iSCSI adapter
I/O operations on a software iSCSI adapter might cause a rare race condition inside the
iscsi_vmk
driver. As a result, ESXi hosts might intermittently fail with a purple diagnostic screen.This issue is resolved in this release.
Patch Category | Security |
Patch Severity | Important |
Host Reboot Required | No |
Virtual Machine Migration or Shutdown Required | No |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | 2917103 |
CVE numbers | N/A |
Updates the tools-light
VIB to resolve the following issues:
- The following VMware Tools ISO images are bundled with ESXi 670-2022060001:
windows.iso
: VMware Tools 12.0.0 supports Windows 7 SP1 or Windows Server 2008 R2 SP1 and later.linux.iso
: VMware Tools 10.3.23 ISO image for Linux OS with glibc 2.11 or later.
The following VMware Tools ISO images are available for download:
- VMware Tools 11.0.6:
windows.iso
: for Windows Vista (SP2) and Windows Server 2008 Service Pack 2 (SP2).
- VMware Tools 10.0.12:
winPreVista.iso
: for Windows 2000, Windows XP, and Windows 2003.linuxPreGLibc25.iso
: supports Linux guest operating systems earlier than Red Hat Enterprise Linux (RHEL) 5, SUSE Linux Enterprise Server (SLES) 11, Ubuntu 7.04, and other distributions with glibc version earlier than 2.5.
-
solaris.iso
: VMware Tools image 10.3.10 for Solaris.
darwin.iso
: Supports Mac OS X versions 10.11 and later.
Follow the procedures listed in the following documents to download VMware Tools for platforms not bundled with ESXi:
Patch Category | Security |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | 2886362, 2963624 |
CVE numbers | N/A |
Updates the cpu-microcode
VIB to resolve the following issues:
- The cpu-microcode VIB includes the following Intel microcode:
Code Name FMS Plt ID MCU Rev MCU Date Brand Names Nehalem EP 0x106a5 0x03 0x0000001d 5/11/2018 Intel Xeon 35xx Series;
Intel Xeon 55xx SeriesClarkdale 0x20652 0x12 0x00000011 5/8/2018 Intel i3/i5 Clarkdale Series;
Intel Xeon 34xx Clarkdale SeriesArrandale 0x20655 0x92 0x00000007 4/23/2018 Intel Core i7-620LE Processor Sandy Bridge DT 0x206a7 0x12 0x0000002f 2/17/2019 Intel Xeon E3-1100 Series;
Intel Xeon E3-1200 Series;
Intel i7-2655-LE Series;
Intel i3-2100 SeriesWestmere EP 0x206c2 0x03 0x0000001f 5/8/2018 Intel Xeon 56xx Series;
Intel Xeon 36xx SeriesSandy Bridge EP 0x206d6 0x6d 0x00000621 3/4/2020 Intel Pentium 1400 Series;
Intel Xeon E5-1400 Series;
Intel Xeon E5-1600 Series;
Intel Xeon E5-2400 Series;
Intel Xeon E5-2600 Series;
Intel Xeon E5-4600 SeriesSandy Bridge EP 0x206d7 0x6d 0x0000071a 3/24/2020 Intel Pentium 1400 Series;
Intel Xeon E5-1400 Series;
Intel Xeon E5-1600 Series;
Intel Xeon E5-2400 Series;
Intel Xeon E5-2600 Series;
Intel Xeon E5-4600 SeriesNehalem EX 0x206e6 0x04 0x0000000d 5/15/2018 Intel Xeon 65xx Series;
Intel Xeon 75xx SeriesWestmere EX 0x206f2 0x05 0x0000003b 5/16/2018 Intel Xeon E7-8800 Series;
Intel Xeon E7-4800 Series;
Intel Xeon E7-2800 SeriesIvy Bridge DT 0x306a9 0x12 0x00000021 2/13/2019 Intel i3-3200 Series;
Intel i7-3500-LE/UE;
Intel i7-3600-QE;
Intel Xeon E3-1200-v2 Series;
Intel Xeon E3-1100-C-v2 Series;
Intel Pentium B925CHaswell DT 0x306c3 0x32 0x00000028 11/12/2019 Intel Xeon E3-1200-v3 Series;
Intel i7-4700-EQ Series;
Intel i5-4500-TE Series;
Intel i3-4300 SeriesIvy Bridge EP 0x306e4 0xed 0x0000042e 3/14/2019 Intel Xeon E5-4600-v2 Series;
Intel Xeon E5-2600-v2 Series;
Intel Xeon E5-2400-v2 Series;
Intel Xeon E5-1600-v2 Series;
Intel Xeon E5-1400-v2 SeriesIvy Bridge EX 0x306e7 0xed 0x00000715 3/14/2019 Intel Xeon E7-8800/4800/2800-v2 Series Haswell EP 0x306f2 0x6f 0x00000049 8/11/2021 Intel Xeon E5-4600-v3 Series;
Intel Xeon E5-2600-v3 Series;
Intel Xeon E5-2400-v3 Series;
Intel Xeon E5-1600-v3 Series;
Intel Xeon E5-1400-v3 SeriesHaswell EX 0x306f4 0x80 0x0000001a 5/24/2021 Intel Xeon E7-8800/4800-v3 Series Broadwell H 0x40671 0x22 0x00000022 11/12/2019 Intel Core i7-5700EQ;
Intel Xeon E3-1200-v4 SeriesAvoton 0x406d8 0x01 0x0000012d 9/16/2019 Intel Atom C2300 Series;
Intel Atom C2500 Series;
Intel Atom C2700 SeriesBroadwell EP/EX 0x406f1 0xef 0x0b000040 5/19/2021 Intel Xeon E7-8800/4800-v4 Series;
Intel Xeon E5-4600-v4 Series;
Intel Xeon E5-2600-v4 Series;
Intel Xeon E5-1600-v4 SeriesSkylake SP 0x50654 0xb7 0x02006d05 11/13/2021 Intel Xeon Platinum 8100 Series;
Intel Xeon Gold 6100/5100, Silver 4100, Bronze 3100 Series;
Intel Xeon D-2100 Series;
Intel Xeon D-1600 Series;
Intel Xeon W-3100 Series;
Intel Xeon W-2100 SeriesCascade Lake B-0 0x50656 0xbf 0x04003302 12/10/2021 Intel Xeon Platinum 9200/8200 Series;
Intel Xeon Gold 6200/5200;
Intel Xeon Silver 4200/Bronze 3200;
Intel Xeon W-3200Cascade Lake 0x50657 0xbf 0x05003302 12/10/2021 Intel Xeon Platinum 9200/8200 Series;
Intel Xeon Gold 6200/5200;
Intel Xeon Silver 4200/Bronze 3200;
Intel Xeon W-3200Cooper Lake 0x5065b 0xbf 0x07002501 11/19/2021 Intel Xeon Platinum 8300 Series;
Intel Xeon Gold 6300/5300Broadwell DE 0x50662 0x10 0x0000001c 6/17/2019 Intel Xeon D-1500 Series Broadwell DE 0x50663 0x10 0x0700001c 6/12/2021 Intel Xeon D-1500 Series Broadwell DE 0x50664 0x10 0x0f00001a 6/12/2021 Intel Xeon D-1500 Series Broadwell NS 0x50665 0x10 0x0e000014 9/18/2021 Intel Xeon D-1600 Series Skylake H/S 0x506e3 0x36 0x000000f0 11/12/2021 Intel Xeon E3-1500-v5 Series;
Intel Xeon E3-1200-v5 SeriesDenverton 0x506f1 0x01 0x00000038 12/2/2021 Intel Atom C3000 Series Ice Lake SP 0x606a6 0x87 0x0d000363 3/30/2022 Intel Xeon Silver 4300 Series;
Intel Xeon Gold 6300/5300 Series;
Intel Xeon Platinum 8300 SeriesSnow Ridge 0x80665 0x01 0x4c000018 11/23/2021 Intel Atom P5000 Series Snow Ridge 0x80667 0x01 0x4c000018 11/23/2021 Intel Atom P5000 Series Kaby Lake H/S/X 0x906e9 0x2a 0x000000f0 11/12/2021 Intel Xeon E3-1200-v6 Series;
Intel Xeon E3-1500-v6 SeriesCoffee Lake 0x906ea 0x22 0x000000f0 11/15/2021 Intel Xeon E-2100 Series;
Intel Xeon E-2200 Series (4 or 6 core)Coffee Lake 0x906eb 0x02 0x000000f0 11/12/2021 Intel Xeon E-2100 Series Coffee Lake 0x906ec 0x22 0x000000f0 11/15/2021 Intel Xeon E-2100 Series Coffee Lake Refresh 0x906ed 0x22 0x000000f0 11/16/2021 Intel Xeon E-2200 Series (8 core) Rocket Lake S 0xa0671 0x02 0x00000053 3/9/2022 Intel Xeon E-2300 Series - ESXi670-202206001 includes the following AMD microcode:
Code name FMS MCU Rev MCU Date Brand names Piledriver 0x00600f20 (15/02/0) 0x0600084f 1/25/2016 AMD Opteron 6300/4300/3300 Naples 0x00800f12 (17/01/2) 0x08001227 2/9/2018 AMD EPYC 7001 Series Milan 0x00a00f10 (19/01/0) 0x0a001058 2/10/2022 AMD EPYC 7003 Series Milan 0x00a00f11 (19/01/1) 0x0a001173 1/31/2022 AMD EPYC 7003 Series Milan-X 0x00a00f12 (19/01/2) 0x0a001229 2/10/2022 AMD EPYC 7003 Series
Profile Name | ESXi-6.7.0-20220604001-standard |
Build | For build information, see Patches Contained in this Release. |
Vendor | VMware, Inc. |
Release Date | June 14, 2022 |
Acceptance Level | PartnerSupported |
Affected Hardware | N/A |
Affected Software | N/A |
Affected VIBs |
|
PRs Fixed | 2891724, 2966100, 2888739, 2919514, 2931457, 2916330, 2819598, 2931040, 2911524, 2911321, 2919813, 2905924, 2912214, 2904032 |
Related CVE numbers | N/A |
- This patch updates the following issues:
-
After you create a virtual machine disk snapshot, you might see latency spikes in the vSphere performance charts. Such unusual spikes are due to the recreation of some internal system objects and the restart of the latency performance counters in the storage subsystem.
-
The response of certain asynchronous task run by a VASA provider, such as
prepareToSnapshot
andcreateVirtualVolume
, might not return sufficient error details for the task in case of failure. As a result, the VMX or hostd services might fail intermittently with a core dump. -
If a hardware iSCSI adapter on an ESXi host in your environment uses pseudo NICs, you might not be able to create a host profile from such a host since pseudo NICs do not have the required PCI address and vendor name for a profile.
-
After a controlled shutdown or booting of any server in a cluster of ESXi servers attached to a Dell EMC Unity array, all LUNs to which that server has access might trespass to one storage processor on the array. As a result, performance of the other ESXi servers accessing the LUNs aggravates.
-
You might not be able to start the vSphere Replication service on a vCenter Server system and see errors such as
Error connecting to proxy: [<FQDN of vCenter Server>, '80']
in the/var/run/log/esxupdate.log
on ESXi hosts. The issue occurs when the vSphere Replication Management Server fails to install thevmware-hbr-agent
VIB on all ESXi hosts due to an incorrect proxy request header sent by ESXi. -
In certain environments, more than 15 parallel ESXCLI calls might cause a deadlock in the hostd service. As a result, hostd becomes intermittently unresponsive on different ESXi hosts.
-
A routine operation to extend a disk on a powered on VM might fail with a message such as
Error: The attempted operation cannot be performed in the current state ("Powered on")
. The issue occurs in rare cases, when the hostd service might wrongly interpret a simple disk extend request as a request to change the virtual disk backing. As a result, the request fails with anInvalidPowerState
error. -
In rare cases, when an NFSv4.1 server returns a transient error during storage failover, you might see virtual machines to become unresponsive for 10 seconds before the operation restarts.
-
In rare cases, the vmsyslog service might rotate logs in an older version of the
/etc/vmsyslog.conf
file. As a result, you see multiple ESXi hosts drop syslog messages. -
The hardware health module of ESXi might fail to decode some sensors of the type System Event when a physical server is rebranded. As a result, in the vSphere Client you see status Unknown for sensors of type System Event under Monitor > Hardware Health.
-
If a virtual machine has CBT enabled, virtual machines might become unresponsive longer than usual during snapshot operations while VMFS allocates resources to create the change tracking file for the delta disk.
-
Due to a rare race condition, when a container port tries to re-acquire a lock it already holds, an ESXi host might fail with a purple diagnostic screen while virtual machines with container ports power off or migrate by using vSphere vMotion. The issue occurs due to duplicating port IDs.
-
In rare cases, a serial device on a virtual machine might not have a
serial<N>.fileName
property and theserial<N>.autodetect
property to be set toFALSE
. As a result, the hostd service might repeatedly fail. -
I/O operations on a software iSCSI adapter might cause a rare race condition inside the
iscsi_vmk
driver. As a result, ESXi hosts might intermittently fail with a purple diagnostic screen.
-
Profile Name | ESXi-6.7.0-20220604001-no-tools |
Build | For build information, see Patches Contained in this Release. |
Vendor | VMware, Inc. |
Release Date | June 14, 2022 |
Acceptance Level | PartnerSupported |
Affected Hardware | N/A |
Affected Software | N/A |
Affected VIBs |
|
PRs Fixed | 2891724, 2966100, 2888739, 2919514, 2931457, 2916330, 2819598, 2931040, 2911524, 2911321, 2919813, 2905924, 2912214, 2904032 |
Related CVE numbers | N/A |
- This patch updates the following issues:
-
After you create a virtual machine disk snapshot, you might see latency spikes in the vSphere performance charts. Such unusual spikes are due to the recreation of some internal system objects and the restart of the latency performance counters in the storage subsystem.
-
The response of certain asynchronous task run by a VASA provider, such as
prepareToSnapshot
andcreateVirtualVolume
, might not return sufficient error details for the task in case of failure. As a result, the VMX or hostd services might fail intermittently with a core dump. -
If a hardware iSCSI adapter on an ESXi host in your environment uses pseudo NICs, you might not be able to create a host profile from such a host since pseudo NICs do not have the required PCI address and vendor name for a profile.
-
After a controlled shutdown or booting of any server in a cluster of ESXi servers attached to a Dell EMC Unity array, all LUNs to which that server has access might trespass to one storage processor on the array. As a result, performance of the other ESXi servers accessing the LUNs aggravates.
-
You might not be able to start the vSphere Replication service on a vCenter Server system and see errors such as
Error connecting to proxy: [<FQDN of vCenter Server>, '80']
in the/var/run/log/esxupdate.log
on ESXi hosts. The issue occurs when the vSphere Replication Management Server fails to install thevmware-hbr-agent
VIB on all ESXi hosts due to an incorrect proxy request header sent by ESXi. -
In certain environments, more than 15 parallel ESXCLI calls might cause a deadlock in the hostd service. As a result, hostd becomes intermittently unresponsive on different ESXi hosts.
-
A routine operation to extend a disk on a powered on VM might fail with a message such as
Error: The attempted operation cannot be performed in the current state ("Powered on")
. The issue occurs in rare cases, when the hostd service might wrongly interpret a simple disk extend request as a request to change the virtual disk backing. As a result, the request fails with anInvalidPowerState
error. -
In rare cases, when an NFSv4.1 server returns a transient error during storage failover, you might see virtual machines to become unresponsive for 10 seconds before the operation restarts.
-
In rare cases, the vmsyslog service might rotate logs in an older version of the
/etc/vmsyslog.conf
file. As a result, you see multiple ESXi hosts drop syslog messages. -
The hardware health module of ESXi might fail to decode some sensors of the type System Event when a physical server is rebranded. As a result, in the vSphere Client you see status Unknown for sensors of type System Event under Monitor > Hardware Health.
-
If a virtual machine has CBT enabled, virtual machines might become unresponsive longer than usual during snapshot operations while VMFS allocates resources to create the change tracking file for the delta disk.
-
Due to a rare race condition, when a container port tries to re-acquire a lock it already holds, an ESXi host might fail with a purple diagnostic screen while virtual machines with container ports power off or migrate by using vSphere vMotion. The issue occurs due to duplicating port IDs.
-
In rare cases, a serial device on a virtual machine might not have a
serial<N>.fileName
property and theserial<N>.autodetect
property to be set toFALSE
. As a result, the hostd service might repeatedly fail. -
I/O operations on a software iSCSI adapter might cause a rare race condition inside the
iscsi_vmk
driver. As a result, ESXi hosts might intermittently fail with a purple diagnostic screen.
-
Profile Name | ESXi-6.7.0-20220601001s-standard |
Build | For build information, see Patches Contained in this Release. |
Vendor | VMware, Inc. |
Release Date | June 14, 2022 |
Acceptance Level | PartnerSupported |
Affected Hardware | N/A |
Affected Software | N/A |
Affected VIBs |
|
PRs Fixed | 2886362, 2916437, 2920288, 2932873, 2932877, 2932879, 2933658, 2936545, 2942580, 2917103, 2886362, 2963624 |
Related CVE numbers | CVE-2022-21123, CVE-2022-21125, CVE-2022-21166, CVE-2004-0230, CVE-2020-7451, CVE-2015-2923, CVE-2015-5358, CVE-2013-3077, CVE-2015-1414, CVE-2018-6918, CVE-2020-7469, CVE-2019-5611, CVE-2020-7457, CVE-2018-6916, CVE-2019-5608 |
- This patch updates the following issues:
- This release includes mitigations for CVE-2022-21123, CVE-2022-21125, and CVE-2022-21166. For more information on these vulnerabilities including impacted product suites and release lines, please see: VMSA-2022-0016.
- ESXi670-202206001 delivers the following security updates:
- The Expat XML parser is updated to version 2.4.7.
- The SQLite database is updated to version 3.37.2.
- cURL is updated to version 7.81.0.
- The OpenSSL package is updated to version openssl-1.0.2zd.
- The ESXi userworld libxml2 library is updated to version 2.9.13.
- This release resolves CVE-2004-0230. VMware has evaluated the severity of this issue to be in the low severity range with a maximum CVSSv3 base score of 3.7.
- This release resolves CVE-2020-7451. VMware has evaluated the severity of this issue to be in the moderate severity range with a maximum CVSSv3 base score of 5.3.
- This release resolves CVE-2015-2923. VMware has evaluated the severity of this issue to be in the moderate severity range with a maximum CVSSv3 base score of 6.5.
- This release resolves CVE-2015-5358. VMware has evaluated the severity of this issue to be in the moderate severity range with a maximum CVSSv3 base score of 6.5.
- This release resolves CVE-2013-3077. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.0.
- This release resolves CVE-2015-1414. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.5.
- This release resolves CVE-2018-6918. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.5.
- This release resolves CVE-2020-7469. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.5.
- This release resolves CVE-2019-5611. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.5.
- This release resolves CVE-2020-7457. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.8.
- This release resolves CVE-2018-6916. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 8.1.
- This release resolves CVE-2019-5608. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 8.1.
-
I/O operations on a software iSCSI adapter might cause a rare race condition inside the
iscsi_vmk
driver. As a result, ESXi hosts might intermittently fail with a purple diagnostic screen. -
The following VMware Tools ISO images are bundled with ESXi 670-2022060001:
windows.iso
: VMware Tools 12.0.0 supports Windows 7 SP1 or Windows Server 2008 R2 SP1 and later.linux.iso
: VMware Tools 10.3.23 ISO image for Linux OS with glibc 2.11 or later.-
The following VMware Tools ISO images are available for download:
- VMware Tools 11.0.6:
windows.iso
: for Windows Vista (SP2) and Windows Server 2008 Service Pack 2 (SP2).
- VMware Tools 10.0.12:
winPreVista.iso
: for Windows 2000, Windows XP, and Windows 2003.linuxPreGLibc25.iso
: supports Linux guest operating systems earlier than Red Hat Enterprise Linux (RHEL) 5, SUSE Linux Enterprise Server (SLES) 11, Ubuntu 7.04, and other distributions with glibc version earlier than 2.5.
- VMware Tools 11.0.6:
- Follow the procedures listed in the following documents to download VMware Tools for platforms not bundled with ESXi:
solaris.iso
: VMware Tools image 10.3.10 for Solaris.darwin.iso
: Supports Mac OS X versions 10.11 and later.- VMware Tools 12.0.0 Release Notes
- Earlier versions of VMware Tools
- What Every vSphere Admin Must Know About VMware Tools
- VMware Tools for hosts provisioned with Auto Deploy
- Updating VMware Tools
- The cpu-microcode VIB includes the following Intel microcode:
Code Name FMS Plt ID MCU Rev MCU Date Brand Names Nehalem EP 0x106a5 0x03 0x0000001d 5/11/2018 Intel Xeon 35xx Series;
Intel Xeon 55xx SeriesClarkdale 0x20652 0x12 0x00000011 5/8/2018 Intel i3/i5 Clarkdale Series;
Intel Xeon 34xx Clarkdale SeriesArrandale 0x20655 0x92 0x00000007 4/23/2018 Intel Core i7-620LE Processor Sandy Bridge DT 0x206a7 0x12 0x0000002f 2/17/2019 Intel Xeon E3-1100 Series;
Intel Xeon E3-1200 Series;
Intel i7-2655-LE Series;
Intel i3-2100 SeriesWestmere EP 0x206c2 0x03 0x0000001f 5/8/2018 Intel Xeon 56xx Series;
Intel Xeon 36xx SeriesSandy Bridge EP 0x206d6 0x6d 0x00000621 3/4/2020 Intel Pentium 1400 Series;
Intel Xeon E5-1400 Series;
Intel Xeon E5-1600 Series;
Intel Xeon E5-2400 Series;
Intel Xeon E5-2600 Series;
Intel Xeon E5-4600 SeriesSandy Bridge EP 0x206d7 0x6d 0x0000071a 3/24/2020 Intel Pentium 1400 Series;
Intel Xeon E5-1400 Series;
Intel Xeon E5-1600 Series;
Intel Xeon E5-2400 Series;
Intel Xeon E5-2600 Series;
Intel Xeon E5-4600 SeriesNehalem EX 0x206e6 0x04 0x0000000d 5/15/2018 Intel Xeon 65xx Series;
Intel Xeon 75xx SeriesWestmere EX 0x206f2 0x05 0x0000003b 5/16/2018 Intel Xeon E7-8800 Series;
Intel Xeon E7-4800 Series;
Intel Xeon E7-2800 SeriesIvy Bridge DT 0x306a9 0x12 0x00000021 2/13/2019 Intel i3-3200 Series;
Intel i7-3500-LE/UE;
Intel i7-3600-QE;
Intel Xeon E3-1200-v2 Series;
Intel Xeon E3-1100-C-v2 Series;
Intel Pentium B925CHaswell DT 0x306c3 0x32 0x00000028 11/12/2019 Intel Xeon E3-1200-v3 Series;
Intel i7-4700-EQ Series;
Intel i5-4500-TE Series;
Intel i3-4300 SeriesIvy Bridge EP 0x306e4 0xed 0x0000042e 3/14/2019 Intel Xeon E5-4600-v2 Series;
Intel Xeon E5-2600-v2 Series;
Intel Xeon E5-2400-v2 Series;
Intel Xeon E5-1600-v2 Series;
Intel Xeon E5-1400-v2 SeriesIvy Bridge EX 0x306e7 0xed 0x00000715 3/14/2019 Intel Xeon E7-8800/4800/2800-v2 Series Haswell EP 0x306f2 0x6f 0x00000049 8/11/2021 Intel Xeon E5-4600-v3 Series;
Intel Xeon E5-2600-v3 Series;
Intel Xeon E5-2400-v3 Series;
Intel Xeon E5-1600-v3 Series;
Intel Xeon E5-1400-v3 SeriesHaswell EX 0x306f4 0x80 0x0000001a 5/24/2021 Intel Xeon E7-8800/4800-v3 Series Broadwell H 0x40671 0x22 0x00000022 11/12/2019 Intel Core i7-5700EQ;
Intel Xeon E3-1200-v4 SeriesAvoton 0x406d8 0x01 0x0000012d 9/16/2019 Intel Atom C2300 Series;
Intel Atom C2500 Series;
Intel Atom C2700 SeriesBroadwell EP/EX 0x406f1 0xef 0x0b000040 5/19/2021 Intel Xeon E7-8800/4800-v4 Series;
Intel Xeon E5-4600-v4 Series;
Intel Xeon E5-2600-v4 Series;
Intel Xeon E5-1600-v4 SeriesSkylake SP 0x50654 0xb7 0x02006d05 11/13/2021 Intel Xeon Platinum 8100 Series;
Intel Xeon Gold 6100/5100, Silver 4100, Bronze 3100 Series;
Intel Xeon D-2100 Series;
Intel Xeon D-1600 Series;
Intel Xeon W-3100 Series;
Intel Xeon W-2100 SeriesCascade Lake B-0 0x50656 0xbf 0x04003302 12/10/2021 Intel Xeon Platinum 9200/8200 Series;
Intel Xeon Gold 6200/5200;
Intel Xeon Silver 4200/Bronze 3200;
Intel Xeon W-3200Cascade Lake 0x50657 0xbf 0x05003302 12/10/2021 Intel Xeon Platinum 9200/8200 Series;
Intel Xeon Gold 6200/5200;
Intel Xeon Silver 4200/Bronze 3200;
Intel Xeon W-3200Cooper Lake 0x5065b 0xbf 0x07002501 11/19/2021 Intel Xeon Platinum 8300 Series;
Intel Xeon Gold 6300/5300Broadwell DE 0x50662 0x10 0x0000001c 6/17/2019 Intel Xeon D-1500 Series Broadwell DE 0x50663 0x10 0x0700001c 6/12/2021 Intel Xeon D-1500 Series Broadwell DE 0x50664 0x10 0x0f00001a 6/12/2021 Intel Xeon D-1500 Series Broadwell NS 0x50665 0x10 0x0e000014 9/18/2021 Intel Xeon D-1600 Series Skylake H/S 0x506e3 0x36 0x000000f0 11/12/2021 Intel Xeon E3-1500-v5 Series;
Intel Xeon E3-1200-v5 SeriesDenverton 0x506f1 0x01 0x00000038 12/2/2021 Intel Atom C3000 Series Ice Lake SP 0x606a6 0x87 0x0d000363 3/30/2022 Intel Xeon Silver 4300 Series;
Intel Xeon Gold 6300/5300 Series;
Intel Xeon Platinum 8300 SeriesSnow Ridge 0x80665 0x01 0x4c000018 11/23/2021 Intel Atom P5000 Series Snow Ridge 0x80667 0x01 0x4c000018 11/23/2021 Intel Atom P5000 Series Kaby Lake H/S/X 0x906e9 0x2a 0x000000f0 11/12/2021 Intel Xeon E3-1200-v6 Series;
Intel Xeon E3-1500-v6 SeriesCoffee Lake 0x906ea 0x22 0x000000f0 11/15/2021 Intel Xeon E-2100 Series;
Intel Xeon E-2200 Series (4 or 6 core)Coffee Lake 0x906eb 0x02 0x000000f0 11/12/2021 Intel Xeon E-2100 Series Coffee Lake 0x906ec 0x22 0x000000f0 11/15/2021 Intel Xeon E-2100 Series Coffee Lake Refresh 0x906ed 0x22 0x000000f0 11/16/2021 Intel Xeon E-2200 Series (8 core) Rocket Lake S 0xa0671 0x02 0x00000053 3/9/2022 Intel Xeon E-2300 Series - ESXi670-202206001 includes the following AMD microcode:
Code name FMS MCU Rev MCU Date Brand names Piledriver 0x00600f20 (15/02/0) 0x0600084f 1/25/2016 AMD Opteron 6300/4300/3300 Naples 0x00800f12 (17/01/2) 0x08001227 2/9/2018 AMD EPYC 7001 Series Milan 0x00a00f10 (19/01/0) 0x0a001058 2/10/2022 AMD EPYC 7003 Series Milan 0x00a00f11 (19/01/1) 0x0a001173 1/31/2022 AMD EPYC 7003 Series Milan-X 0x00a00f12 (19/01/2) 0x0a001229 2/10/2022 AMD EPYC 7003 Series
Profile Name | ESXi-6.7.0-20220601001s-no-tools |
Build | For build information, see Patches Contained in this Release. |
Vendor | VMware, Inc. |
Release Date | June 14, 2022 |
Acceptance Level | PartnerSupported |
Affected Hardware | N/A |
Affected Software | N/A |
Affected VIBs |
|
PRs Fixed | 2886362, 2916437, 2920288, 2932873, 2932877, 2932879, 2933658, 2936545, 2942580, 2886362, 2963624 |
Related CVE numbers | CVE-2022-21123, CVE-2022-21125, CVE-2022-21166, CVE-2004-0230, CVE-2020-7451, CVE-2015-2923, CVE-2015-5358, CVE-2013-3077, CVE-2015-1414, CVE-2018-6918, CVE-2020-7469, CVE-2019-5611, CVE-2020-7457, CVE-2018-6916, CVE-2019-5608 |
- This patch updates the following issues:
- This release includes mitigations for CVE-2022-21123, CVE-2022-21125, and CVE-2022-21166. For more information on these vulnerabilities including impacted product suites and release lines, please see: VMSA-2022-0016.
- ESXi670-202206001 delivers the following security updates:
- The Expat XML parser is updated to version 2.4.7.
- The SQLite database is updated to version 3.37.2.
- cURL is updated to version 7.81.0.
- The OpenSSL package is updated to version openssl-1.0.2zd.
- The ESXi userworld libxml2 library is updated to version 2.9.13.
- This release resolves CVE-2004-0230. VMware has evaluated the severity of this issue to be in the low severity range with a maximum CVSSv3 base score of 3.7.
- This release resolves CVE-2020-7451. VMware has evaluated the severity of this issue to be in the moderate severity range with a maximum CVSSv3 base score of 5.3.
- This release resolves CVE-2015-2923. VMware has evaluated the severity of this issue to be in the moderate severity range with a maximum CVSSv3 base score of 6.5.
- This release resolves CVE-2015-5358. VMware has evaluated the severity of this issue to be in the moderate severity range with a maximum CVSSv3 base score of 6.5.
- This release resolves CVE-2013-3077. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.0.
- This release resolves CVE-2015-1414. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.5.
- This release resolves CVE-2018-6918. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.5.
- This release resolves CVE-2020-7469. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.5.
- This release resolves CVE-2019-5611. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.5.
- This release resolves CVE-2020-7457. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.8.
- This release resolves CVE-2018-6916. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 8.1.
- This release resolves CVE-2019-5608. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 8.1.
-
I/O operations on a software iSCSI adapter might cause a rare race condition inside the
iscsi_vmk
driver. As a result, ESXi hosts might intermittently fail with a purple diagnostic screen. -
The following VMware Tools ISO images are bundled with ESXi 670-2022060001:
windows.iso
: VMware Tools 12.0.0 supports Windows 7 SP1 or Windows Server 2008 R2 SP1 and later.linux.iso
: VMware Tools 10.3.23 ISO image for Linux OS with glibc 2.11 or later.-
The following VMware Tools ISO images are available for download:
- VMware Tools 11.0.6:
windows.iso
: for Windows Vista (SP2) and Windows Server 2008 Service Pack 2 (SP2).
- VMware Tools 10.0.12:
winPreVista.iso
: for Windows 2000, Windows XP, and Windows 2003.linuxPreGLibc25.iso
: supports Linux guest operating systems earlier than Red Hat Enterprise Linux (RHEL) 5, SUSE Linux Enterprise Server (SLES) 11, Ubuntu 7.04, and other distributions with glibc version earlier than 2.5.
- VMware Tools 11.0.6:
- Follow the procedures listed in the following documents to download VMware Tools for platforms not bundled with ESXi:
solaris.iso
: VMware Tools image 10.3.10 for Solaris.darwin.iso
: Supports Mac OS X versions 10.11 and later.- VMware Tools 12.0.0 Release Notes
- Earlier versions of VMware Tools
- What Every vSphere Admin Must Know About VMware Tools
- VMware Tools for hosts provisioned with Auto Deploy
- Updating VMware Tools
- The cpu-microcode VIB includes the following Intel microcode:
Code Name FMS Plt ID MCU Rev MCU Date Brand Names Nehalem EP 0x106a5 0x03 0x0000001d 5/11/2018 Intel Xeon 35xx Series;
Intel Xeon 55xx SeriesClarkdale 0x20652 0x12 0x00000011 5/8/2018 Intel i3/i5 Clarkdale Series;
Intel Xeon 34xx Clarkdale SeriesArrandale 0x20655 0x92 0x00000007 4/23/2018 Intel Core i7-620LE Processor Sandy Bridge DT 0x206a7 0x12 0x0000002f 2/17/2019 Intel Xeon E3-1100 Series;
Intel Xeon E3-1200 Series;
Intel i7-2655-LE Series;
Intel i3-2100 SeriesWestmere EP 0x206c2 0x03 0x0000001f 5/8/2018 Intel Xeon 56xx Series;
Intel Xeon 36xx SeriesSandy Bridge EP 0x206d6 0x6d 0x00000621 3/4/2020 Intel Pentium 1400 Series;
Intel Xeon E5-1400 Series;
Intel Xeon E5-1600 Series;
Intel Xeon E5-2400 Series;
Intel Xeon E5-2600 Series;
Intel Xeon E5-4600 SeriesSandy Bridge EP 0x206d7 0x6d 0x0000071a 3/24/2020 Intel Pentium 1400 Series;
Intel Xeon E5-1400 Series;
Intel Xeon E5-1600 Series;
Intel Xeon E5-2400 Series;
Intel Xeon E5-2600 Series;
Intel Xeon E5-4600 SeriesNehalem EX 0x206e6 0x04 0x0000000d 5/15/2018 Intel Xeon 65xx Series;
Intel Xeon 75xx SeriesWestmere EX 0x206f2 0x05 0x0000003b 5/16/2018 Intel Xeon E7-8800 Series;
Intel Xeon E7-4800 Series;
Intel Xeon E7-2800 SeriesIvy Bridge DT 0x306a9 0x12 0x00000021 2/13/2019 Intel i3-3200 Series;
Intel i7-3500-LE/UE;
Intel i7-3600-QE;
Intel Xeon E3-1200-v2 Series;
Intel Xeon E3-1100-C-v2 Series;
Intel Pentium B925CHaswell DT 0x306c3 0x32 0x00000028 11/12/2019 Intel Xeon E3-1200-v3 Series;
Intel i7-4700-EQ Series;
Intel i5-4500-TE Series;
Intel i3-4300 SeriesIvy Bridge EP 0x306e4 0xed 0x0000042e 3/14/2019 Intel Xeon E5-4600-v2 Series;
Intel Xeon E5-2600-v2 Series;
Intel Xeon E5-2400-v2 Series;
Intel Xeon E5-1600-v2 Series;
Intel Xeon E5-1400-v2 SeriesIvy Bridge EX 0x306e7 0xed 0x00000715 3/14/2019 Intel Xeon E7-8800/4800/2800-v2 Series Haswell EP 0x306f2 0x6f 0x00000049 8/11/2021 Intel Xeon E5-4600-v3 Series;
Intel Xeon E5-2600-v3 Series;
Intel Xeon E5-2400-v3 Series;
Intel Xeon E5-1600-v3 Series;
Intel Xeon E5-1400-v3 SeriesHaswell EX 0x306f4 0x80 0x0000001a 5/24/2021 Intel Xeon E7-8800/4800-v3 Series Broadwell H 0x40671 0x22 0x00000022 11/12/2019 Intel Core i7-5700EQ;
Intel Xeon E3-1200-v4 SeriesAvoton 0x406d8 0x01 0x0000012d 9/16/2019 Intel Atom C2300 Series;
Intel Atom C2500 Series;
Intel Atom C2700 SeriesBroadwell EP/EX 0x406f1 0xef 0x0b000040 5/19/2021 Intel Xeon E7-8800/4800-v4 Series;
Intel Xeon E5-4600-v4 Series;
Intel Xeon E5-2600-v4 Series;
Intel Xeon E5-1600-v4 SeriesSkylake SP 0x50654 0xb7 0x02006d05 11/13/2021 Intel Xeon Platinum 8100 Series;
Intel Xeon Gold 6100/5100, Silver 4100, Bronze 3100 Series;
Intel Xeon D-2100 Series;
Intel Xeon D-1600 Series;
Intel Xeon W-3100 Series;
Intel Xeon W-2100 SeriesCascade Lake B-0 0x50656 0xbf 0x04003302 12/10/2021 Intel Xeon Platinum 9200/8200 Series;
Intel Xeon Gold 6200/5200;
Intel Xeon Silver 4200/Bronze 3200;
Intel Xeon W-3200Cascade Lake 0x50657 0xbf 0x05003302 12/10/2021 Intel Xeon Platinum 9200/8200 Series;
Intel Xeon Gold 6200/5200;
Intel Xeon Silver 4200/Bronze 3200;
Intel Xeon W-3200Cooper Lake 0x5065b 0xbf 0x07002501 11/19/2021 Intel Xeon Platinum 8300 Series;
Intel Xeon Gold 6300/5300Broadwell DE 0x50662 0x10 0x0000001c 6/17/2019 Intel Xeon D-1500 Series Broadwell DE 0x50663 0x10 0x0700001c 6/12/2021 Intel Xeon D-1500 Series Broadwell DE 0x50664 0x10 0x0f00001a 6/12/2021 Intel Xeon D-1500 Series Broadwell NS 0x50665 0x10 0x0e000014 9/18/2021 Intel Xeon D-1600 Series Skylake H/S 0x506e3 0x36 0x000000f0 11/12/2021 Intel Xeon E3-1500-v5 Series;
Intel Xeon E3-1200-v5 SeriesDenverton 0x506f1 0x01 0x00000038 12/2/2021 Intel Atom C3000 Series Ice Lake SP 0x606a6 0x87 0x0d000363 3/30/2022 Intel Xeon Silver 4300 Series;
Intel Xeon Gold 6300/5300 Series;
Intel Xeon Platinum 8300 SeriesSnow Ridge 0x80665 0x01 0x4c000018 11/23/2021 Intel Atom P5000 Series Snow Ridge 0x80667 0x01 0x4c000018 11/23/2021 Intel Atom P5000 Series Kaby Lake H/S/X 0x906e9 0x2a 0x000000f0 11/12/2021 Intel Xeon E3-1200-v6 Series;
Intel Xeon E3-1500-v6 SeriesCoffee Lake 0x906ea 0x22 0x000000f0 11/15/2021 Intel Xeon E-2100 Series;
Intel Xeon E-2200 Series (4 or 6 core)Coffee Lake 0x906eb 0x02 0x000000f0 11/12/2021 Intel Xeon E-2100 Series Coffee Lake 0x906ec 0x22 0x000000f0 11/15/2021 Intel Xeon E-2100 Series Coffee Lake Refresh 0x906ed 0x22 0x000000f0 11/16/2021 Intel Xeon E-2200 Series (8 core) Rocket Lake S 0xa0671 0x02 0x00000053 3/9/2022 Intel Xeon E-2300 Series - ESXi670-202206001 includes the following AMD microcode:
Code name FMS MCU Rev MCU Date Brand names Piledriver 0x00600f20 (15/02/0) 0x0600084f 1/25/2016 AMD Opteron 6300/4300/3300 Naples 0x00800f12 (17/01/2) 0x08001227 2/9/2018 AMD EPYC 7001 Series Milan 0x00a00f10 (19/01/0) 0x0a001058 2/10/2022 AMD EPYC 7003 Series Milan 0x00a00f11 (19/01/1) 0x0a001173 1/31/2022 AMD EPYC 7003 Series Milan-X 0x00a00f12 (19/01/2) 0x0a001229 2/10/2022 AMD EPYC 7003 Series
Known Issues
The known issues are grouped as follows.
vSAN Issues- PR 2855671: vSAN disk format upgrade fails, objects not upgrading to version 3
When you upgrade host software from 6.0 to 6.0 Update 2, and the vCenter Server software version is 6.7, vSAN disk format upgrade fails. Objects do not upgrade to version 3. When the error occurs, the vSAN upgrade task fails with an error message such as
General vSAN error. Disk format conversion failed due to unexpected error.
and the host disk group format version remains unchanged.Workaround: Upgrade the host software to version ESXi650-201704001 that includes new features and bug fixes related to vSAN 6.6, or higher, and then upgrade the disk format version.