Esxi 6.5 Patch

A few months back, we discussed how to upgrade ESXi hosts using VMware Update Manager. However, if you do not employ VUM, hosts can also be upgraded via ESXCLi commands using an online repository. In this tutorial, we will upgrade an ESXi host from 6.0 to 6.5 using VMware Online Depot. In addition, I will discuss how to differentiate image profiles within the depot. If you are unfamiliar with. Name Patch Date Build; ESXi 6.5 February 2021 Patch: ESXi601: 2021-02-23: 17477841: ESXi 6.5 February 2021 Patch (Security Only) ESXi601. How do i patch my esxi 6.5 hypervisor? I see in 'packages' category that i have updates to install, but when i push 'Install update' i have to ' Enter the URL or datastore path of the VIB below', but i haven't tis url. Upgrading ESXi 6.5 to ESXi 6.7. Select the required ESXi host and check the version and build. Name Version Vendor Summary Category Severity Bulletin; cpu-microcode: 7.0.1-0.1: VMware: CPU microcode updates: bugfix: important: ESXi7.0.1-0.1.

One of my favorite features in vCenter 6.5 is the built-in Update Manager. VMware Update Manager (VUM) 6.5 is used to patch and upgrade vSphere ESXi hosts, virtual appliances, VMware Tools, and virtual hardware. Previous versions of the vCenter Server Appliance required a separate Windows machine to run Update Manager. For many admins, this was a deterrent in deploying VUM. Now that the embedded Update Manager leverages the vCenter Server Appliance Postgres database, there is no additional vms to install or management items to configure. Update Manager has proved to be tremendously handy in keeping environments properly updated.

If you are looking to upgrade your ESXi to vSphere 6.5, Update Manager is a solid choice. This post will focus on the process of upgrading ESXi 6.0 to 6.5 utilizing VUM.

This may go without saying, but before beginning, ensure your vCenter Appliance is at version 6.5.

To start the process, navigate to Update Manager from the vCenter Server Appliance Web Client.

Import ESXi Image

Esxi 6.5 Patch 2021

Esxi 6.5 Patch

Let’s begin by importing our 6.5 ESXi Image. To do so, select the vCenter Server under Navigator. Click the Manage tab, navigate to ESXi Images, and finally click Import ESXi Image.

Browse to the ESXi Image location and select the ISO. Once selected, the upload process will begin.

After uploaded, you will be provided a review of the ESXi Image information.

Create Baseline

Next, we will add this Image as a Baseline. Navigate to the Host Baselines tab and select New Baseline.

The New Baseline wizard will begin. Enter the Name and Baseline Type. In this instance, we will choose Host Upgrade.

Next, select the uploaded ESXi Image to upgrade.

Review your selections and click Finish when ready.

Esxi 6.5 patch

We have uploaded the Image and the Baseline is created. Our next step will be to Attach the Baseline to the cluster.

Attach Baseline

Select Go to Compliance View to begin.

With your cluster selected, choose Attach Baseline.

Select the pertinent Upgrade Baseline.

This next step is optional, but if you would like to verify the compliance of your Baseline, select Scan for Updates.

Remediate

In our last step, we will set our Remediation Options and begin the Remediation process. Click the Remediate Button to begin.

Select the correct Baseline to remediate.

Select the Host(s) for remediation.

Read and Accept the EULA.

In the Advanced Options section, we can schedule a specific time to run the remediation and/or choose to ignore unsupported items. For this, we will leave both unchecked.

Next, specify maintenance mode options. The first option will be determining what you want to be done with machines when the host enters into maintenance mode. We want to do this without vm downtime, so we will leave VM Power state at Do Not Change VM Power State. Options for disabling removable media and retrying maintenance mode can also be changed.

Finally, select the pertinent cluster options you would like to apply during the remediation.

Note: For hosts in a cluster, the remediation process runs sequentially by default. If you would like to run the remediation in parallel, indicate that during this step.

Review your selections and click Finish to start the remediation.

Monitor progress from the Recent Tasks pane. The remediation process will look like this:

  • The first host is put in maintenance mode
    • VMs will be migrated to other cluster hosts
  • Host upgrade begins in background
  • Host restarts once installation is complete
  • Host reconnects to vCenter
  • Host exits Maintenance Mode
  • Remediation process moves to next host

Once the remediation process is complete, your ESXi hosts will be upgraded to 6.5.

Release Date: MAY 28, 2020

Build Details

Download Filename:ESXi650-202005001.zip
Build:16207673
Download Size:343.3 MB
md5sum:273fbaf2d20172ad0b6f61f11933d38b
sha1checksum:08cc768779b7f6a0805cbae5953d034f380ab626
Host Reboot Required:Yes
Virtual Machine Migration or Shutdown Required:Yes

Bulletins

Bulletin IDCategorySeverity
ESXi650-202005401-SGSecurityImportant

Rollup Bulletin

This rollup bulletin contains the latest VIBs with all the fixes since the initial release of ESXi 6.5.

Bulletin IDCategorySeverity
ESXi650-202005001SecurityImportant

Image Profiles

VMware patch and update releases contain general and critical image profiles. Application of the general release image profile applies to new bug fixes.

Image Profile Name
ESXi-6.5.0-20200504001-standard
ESXi-6.5.0-20200504001-no-tools

For more information about the individual bulletins, see the Download Patches page and the Resolved Issues section.

Patch Download and Installation

The typical way to apply patches to ESXi hosts is through the VMware vSphere Update Manager. For details, see the About Installing and Administering VMware vSphere Update Manager.

ESXi hosts can be updated by manually downloading the patch ZIP file from the VMware download page and installing the VIB by using the esxcli software vib command. Additionally, the system can be updated using the image profile and the esxcli software profile command.

For more information, see the vSphere Command-Line Interface Concepts and Examples and the vSphere Upgrade Guide.

Resolved Issues

The resolved issues are grouped as follows.

ESXi650-202005401-SG

Esxi 6.5 Patching

Patch CategorySecurity
Patch SeverityImportant
Host Reboot RequiredYes
Virtual Machine Migration or Shutdown RequiredYes
Affected HardwareN/A
Affected SoftwareN/A
VIBs Included
  • VMware_bootbank_vsanhealth_6.5.0-3.126.15965596
  • VMware_bootbank_esx-tboot_6.5.0-3.126.16207673
  • VMware_bootbank_esx-base_6.5.0-3.126.16207673
  • VMware_bootbank_vsan_6.5.0-3.126.15965595
PRs FixedN/A
Related CVE numbersCVE-2020-3958

This patch updates the esx-base, vsan, esx-tboot and vsanhealth VIBs to update the following issue:

  • ESXi has a denial-of-service vulnerability in the shader functionality. Attackers with non-administrative access to a virtual machine might exploit this issue to fail the VMX process of the virtual machine, leading to a denial of service condition. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2020-3958 to this issue. For more information, see VMSA-2020-0011.

ESXi-6.5.0-20200504001-standard
Profile NameESXi-6.5.0-20200504001-standard
BuildFor build information, see the top of the page.
VendorVMware, Inc.
Release DateMay 28, 2020
Acceptance LevelPartnerSupported
Affected HardwareN/A
Affected SoftwareN/A
Affected VIBs
  • VMware_bootbank_vsanhealth_6.5.0-3.126.15965596
  • VMware_bootbank_esx-tboot_6.5.0-3.126.16207673
  • VMware_bootbank_esx-base_6.5.0-3.126.16207673
  • VMware_bootbank_vsan_6.5.0-3.126.15965595
PRs FixedN/A
Related CVE numbersCVE-2020-3958
  • ESXi has a denial-of-service vulnerability in the shader functionality. Attackers with non-administrative access to a virtual machine might exploit this issue to fail the VMX process of the virtual machine, leading to a denial of service condition. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2020-3958 to this issue. For more information, see VMSA-2020-0011.

ESXi-6.5.0-20200504001-no-tools
Profile NameESXi-6.5.0-20200504001-no-tools
BuildFor build information, see the top of the page.
VendorVMware, Inc.
Release DateMay 28, 2020
Acceptance LevelPartnerSupported
Affected HardwareN/A
Affected SoftwareN/A
Affected VIBs
  • VMware_bootbank_vsanhealth_6.5.0-3.126.15965596
  • VMware_bootbank_esx-tboot_6.5.0-3.126.16207673
  • VMware_bootbank_esx-base_6.5.0-3.126.16207673
  • VMware_bootbank_vsan_6.5.0-3.126.15965595
PRs FixedN/A
Related CVE numbersCVE-2020-3958
  • ESXi has a denial-of-service vulnerability in the shader functionality. Attackers with non-administrative access to a virtual machine might exploit this issue to fail the VMX process of the virtual machine, leading to a denial of service condition. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2020-3958 to this issue. For more information, see VMSA-2020-0011.