This document tracks the release of 7.0.x patches to the Photon Operating System bundled in VMware vCenter Server.

You can download the deliverables from the  VMware Patch Download Center.

Installation Steps

To apply the Photon OS security patches to the vCenter Server Appliance, you can use one of the methods.

  • Deploy a new vCenter Server Appliance by using either the GUI or the CLI installer.

    For information about doing a fresh install of the vCenter Server Appliance, see Deploying the vCenter Server Appliance and Platform Services Controller Appliance.

  • Upgrade to the version of the vCenter Server Appliance containing the latest Photon OS security patches by using either the GUI or the CLI installer.

    For information about upgrading the vCenter Server Appliance, see Upgrading the vCenter Server Appliance.

  • Patch the appliance either by using the appliance shell or the Appliance Management Interface.

    IMPORTANT: You can update the vCenter Server Appliance with Photon OS patches released within one and the same Update release. 

    For information on patching the vCenter Server Appliance, see Patching vCenter Server.

  • Perform a file-based backup and restore where in the restore process you deploy a new appliance containing the latest Photon OS security patches..

    For information performing a file-based backup and restore of the vCenter Server Appliance, see Restore vCenter Server from a File-Based Backup.

  • Migrate a vCenter Server on Windows instance to a version of the vCenter Server Appliance containing the latest Photon OS security patches.

    For information about performing a migration of vCenter Server on Windows to vCenter Server Appliance, see Migrating vCenter Server for Windows to vCenter Server Appliance.

vCenter Server Appliance Photon OS Security Patches

vSphere 7.0 Update 2

Release Date

Build Number

Patch Name

Affected Package

New Package Versions

CVEs Addressed

24 August 2021 18356314 vCenter Server 7.0 Update 2c
(Security fixes for Photon OS)
apache-tomcat 8.5.60-2.ph3 CVE-2021-25122
CVE-2021-25329
atftp 0.7.2-2.ph3 CVE-2020-6097
bindutils 9.16.6-2.ph3 CVE-2020-8625
c-ares 1.16.1-1.ph3 CVE-2020-8277
containerd 1.4.4-1.ph3 CVE-2021-21334
dnsmasq 2.82-2.ph3 CVE-2020-25681
CVE-2020-25682
glib 2.58.0-7.ph3 CVE-2021-27218
CVE-2021-27219
glibc 2.28-12.ph3 CVE-2021-3326
gnutls 3.6.15-3.ph3 CVE-2021-20231
grub2 2.06~rc1-1.ph3 CVE-2021-20232
CVE-2020-14372
CVE-2020-25632
CVE-2020-25647
CVE-2020-27749
CVE-2020-27779
CVE-2021-20225
CVE-2021-20233
CVE-2021-3418
linux 4.19.186-3.ph3 CVE-2020-29569
CVE-2020-29661
CVE-2021-3347
CVE-2021-26930
CVE-2021-27365
CVE-2021-28660
CVE-2021-28972
nettle 3.7.2-1.ph3 CVE-2021-20305
nss 3.44-6.ph3 CVE-2020-12403
openldap 2.4.57-2.ph3 CVE-2020-36221
CVE-2020-36222
CVE-2020-36223
CVE-2020-36224
CVE-2020-36225
CVE-2020-36226
CVE-2020-36227
CVE-2020-36228
CVE-2020-36229
CVE-2020-36230
CVE-2021-27212
openssl 1.0.2y-1.ph3 CVE-2021-23839
CVE-2021-23840
runc 1.0.0.rc93-2.ph3 CVE-2021-30465
sudo 1.9.5-3.ph3 CVE-2021-23240
CVE-2021-3156
check-circle-line exclamation-circle-line close-line
Scroll to top icon