Skip to main content

Updating ESXi v5.5 for Heartbleed/ OpenSSL vulnerability - VMware virtualisation - esxi550-201404020

Today I got a chance to update my ESXi v5.5 with patch released by VMware so wanted to put quick notes for anyone who may need help in patching their ESXi standalone host for openssl vulnerability.

VMWare Advisory lists what is affected with OpenSSL/ Heartbleed vulnerability.

1. Follow the link for ESXi 5.5 / ESXi 5.5 Update 1 from above Advisory page and download relevant patch listed on the table from download site.

2. Connect to your host using SSH (Putty) and check your current ESXi version.

# vmware -v
This should list VMware ESXi 5.5.0 build-1331820 or similar.

# uname -a

VMkernel myHOST 5.5.0 #1 SMP Release build-1331820 Sep 18 2013 23:08:31 x86_64 GNU/Linux

3. Transfer your patch downloaded in zip format over to one of the datastores using vSphere client. In my case the patch downloaded form VMware was

4. Now run below to list patch contents.

#esxcli software sources profile list -d=/vmfs/volumes/YOURDATASTORE/

The output of above will look something like below.

Name                              Vendor        Acceptance Level
--------------------------------  ------------  ----------------
ESXi-5.5.0-20140401020s-no-tools  VMware, Inc.  PartnerSupported

ESXi-5.5.0-20140401020s-standard  VMware, Inc.  PartnerSupported

5. Using above highlighted line install your profile.

#esxcli software profile install -d=/vmfs/volumes/YOURDATASTORE/ -p "ESXi-5.5.0-20140401020s-standard" --ok-to-remove

You will see output like below with a full list of vibs installed.

Installation Result
   Message: The update completed successfully, but the system needs to be rebooted for the changes to be effective.
   Reboot Required: true

   VIBs Installed: VMware_bootbank_elxnet_10.0.100.0v-1vmw.550.0.0.1331820
-------------output truncated---------------

6. Reboot your host.


7. Check the latest version and build number.

#vmware -v

VMware ESXi 5.5.0 build-1746974

#uname -a

VMkernel myHOST 5.5.0 #1 SMP Release build-1746974 Apr 15 2014 11:11:56 x86_64 GNU/Linux

8. Generate new SSL Certificate

9. Change root password

All done.

Popular posts from this blog

TrueCrypt on macOS X Mojave 10.14

If you have updated your macOS recently to Mojave otherwise known as verison 10.14 you may not be able to install the last version of Truecrypt in order to access your old volumes encrypted with Truecrypt software. This article will guide you to get this working on your MacOS v10.14 (Mjoave) . Download the package from  or . Find downloaded package using Finder in your HDD/Users/username/Downloads folder and will look like  TrueCrypt 7.1a Mac OS X.dmg . Open file location in Finder and open or double click on  TrueCrypt 7.1a Mac OS X.dmg . This will mount Truecrypt 7.1a and will have Truecrypt 7.1a.mpkg in it. Drag the package T rueCrypt 7.1a.mpkg and drop in your Downloads folder. From Locations in Finder you can eject your TrueCrypt mount. Now go to your Downloads location, find the file  TrueCrypt 7.1a.mpkg , right click and select Show Package Contents . Find the file Contents/distribution.di

CoVid-19 Statistics and Charts

Statistics based on some specific metrics are listed below. The data is based on daily information from Worldometer and updated manually. Charts will update automatically. Please use links below to get to individual charts and feel free to bookmark this page but do not bookmark direct chart link as it may change. These charts compare statistics for countries including China, Italy, UK, US, Pakistan & India. (Does not work in Safari Mobile) Please click on links below for specific chart, more to come. Death Doubling Rate Chart showing death rate doubling in x number of days. Survival Rate This chart shows trend of patients successfully recovered vs total closed cases. Death rate comparison Comparison of deaths per cases every day showing trend comparison and days behind. Cases reported No of cases reported, how far they are behind each other and trend. Deaths reported No of deaths reported with trend comparison betwee

Running VNC Server as a Service on Ubuntu

Method 1: VNC Server as a Service on Ubuntu desktop similar to Redhat sysconfig sudo apt-get install vncserver sudo mkdir -p /etc/sysconfig sudo touch /etc/sysconfig/vncservers sudo vi /etc/sysconfig/vncservers # Add following VNC Server instances where username and arguments are defined for each session. VNCSERVERS=" 1:user1 2:user2 3:user3 " VNCSERVERARGS[1]=" -geometry 1280x992 -depth 16 " VNCSERVERARGS[2]=" -geometry 800x600 -depth 8 " VNCSERVERARGS[3]=" -geometry 980x720 " sudo vi /etc/init.d/vncserver # Add below to the service script #!/bin/bash # # chkconfig: - 91 35 # description: Starts and stops vncserver. \ # used to provide remote X administration services. # Source function library. # . /etc/init.d/functions # Source networking configuration. # . /etc/sysconfig/network # Check that networking is up. # [ ${NETWORKING} = "no" ] && exit 0 unset VNCSERVERARGS VNC