This document tracks the release of 8.x patches to the Photon Operating System bundled in VMware vCenter Server.

You can download the deliverables from the VMware Patch Download Center.

Installation Steps

To apply the Photon OS security patches to the vCenter Server Appliance, you can use one of the methods.

  • Deploy a new vCenter Server by using either the GUI or the CLI installer.

    For information about doing a fresh install of the vCenter Server Appliance, see Deploying the vCenter Server Appliance.

  • Upgrade to the version of the vCenter Server Appliance containing the latest Photon OS security patches by using either the GUI or the CLI installer.

    For information about upgrading the vCenter Server Appliance, see Upgrading the vCenter Server Appliance.

  • Patch the appliance either by using the appliance shell or the Appliance Management Interface.

    IMPORTANT: You can update the vCenter Server Appliance with Photon OS patches released within one and the same Update release. 

    For information on patching the vCenter Server Appliance, see Patching and Updating vCenter Server 8.0 Deployments.

  • Perform a file-based backup and restore where in the restore process you deploy a new appliance containing the latest Photon OS security patches..

    For information performing a file-based backup and restore of the vCenter Server Appliance, see Restore vCenter Server from a File-Based Backup.

  • Migrate a vCenter Server on Windows instance to a version of the vCenter Server Appliance containing the latest Photon OS security patches.

    For information about performing a migration of vCenter Server on Windows to vCenter Server Appliance, see Migrating vCenter Server for Windows to vCenter Server Appliance.

vCenter Server 8.0 Photon OS Security Patches

  • vCenter Server 8.0b

    Release Date

    Build Number

    Patch Name

    Affect Package

    New Package Version

    CVEs Addressed

    14 February 2023

    21216066

    vCenter Server 8.0b (Security fixes for Photon OS)

    apache-ant

    1.10.12-1.ph3

    CVE-2020-11979

    CVE-2017-1000487

    CVE-2022-24839

    apache-tomcat

    8.5.78-2.ph3

    CVE-2022-29885

    c-ares

    1.16.1-2.ph3

    CVE-2020-8277

    cifs-utils

    6.8-4.ph3

    CVE-2022-27239

    containerd

    1.4.13-5.ph3

    CVE-2022-23648

    curl

    7.86.0-2.ph3

    CVE-2022-32207

    CVE-2022-22576

    CVE-2022-27782

    CVE-2022-27781

    CVE-2022-27775

    CVE-2021-22946

    CVE-2021-22926

    CVE-2020-8286

    CVE-2020-8285

    CVE-2022-42915

    CVE-2022-42916

    glibc

    2.28-22.ph3

    CVE-2022-23219   

    CVE-2022-23218   

    CVE-2021-33574   

    CVE-2021-35942   

    CVE-2021-3999   

    CVE-2021-3998   

    CVE-2021-43396   

    CVE-2021-38604   

    CVE-2021-3326

    libarchive

    3.3.3-8.ph3

    CVE-2021-31566

    CVE-2021-23177

    libtasn1

    4.14-2.ph3

    CVE-2021-46848

    libxml2

    2.9.11-8.ph3

    CVE-2022-2309

    libxslt

    1.1.34-1.ph3

    CVE-2021-30560

    linux

    4.19.264-6.ph3

    CVE-2022-2977   

    CVE-2022-39842   

    CVE-2022-2938   

    CVE-2022-20368   

    CVE-2022-2327   

    CVE-2022-34918   

    CVE-2022-32250   

    CVE-2022-1786   

    CVE-2022-29581   

    CVE-2022-30594   

    CVE-2022-1652   

    CVE-2022-27666   

    CVE-2022-1011   

    CVE-2022-24958   

    CVE-2021-4197   

    CVE-2021-4037   

    CVE-2022-36946

    nghttp2

    1.41.0-2.ph3

    CVE-2015-8659

    CVE-2020-11080

    openldap

    2.4.57-3.ph3

    CVE-2022-29155

    openssl

    1.0.2ze-3.ph3

    CVE-2022-2068

    CVE-2022-1292

    CVE-2022-0778

    CVE-2021-23840

    pcre

    8.44-2.ph3

    CVE-2019-20838

    postgresql

    10.22-1.ph3

    CVE-2022-2625

    ruby 

    2.5.8-4.ph3

    CVE-2020-10663

    CVE-2020-25613

    runc

    1.1.3-3.ph3

    CVE-2022-29162

    sysstat

    12.7.1-1.ph3

    CVE-2022-39377

check-circle-line exclamation-circle-line close-line
Scroll to top icon