VMware on Friday issued patches for a critical security vulnerability in its ESX and ESXi virtualization products.
The issue is new, different from the vulnerability in a guest virtual device driver that was patched by VMware earlier this week. That earlier flaw could cause a potential denial-of-service, and affected Workstation, Player, ACE, Server, ESX and ESXi virtualization products.
One of the reasons this new vulnerability was labeled "critical" is that it could affect the underlying host operating system in a virtual environment.
“A critical vulnerability in the virtual machine display function might allow a guest operating system to run code on the host,” the VMware advisory said.
The VMware advisory lists a number of VMware versions that are affected, and whether the patches will properly address the vulnerability. But apparently, some users who have older versions may not be helped.
“Depending on your version, your only option may be to upgrade rather than patch,” wrote Steve Hall, handler at the SANS Internet Storm Center, on the organization's blog.
The typical way to apply patches to ESXi hosts is through the VMware Update Manager, but ESXi hosts can also be updated by downloading a single offline download file, according to VMware.