====================================================

업데이트 공지 : https://docs.vmware.com/en/VMware-vSphere/6.7/rn/esxi670-201905001.html 

패치는 VMWARE 로그인해야 받을 수 있습니다. 

VIB Esxcli Update 방법 : https://docs.vmware.com/kr/VMware-vSphere/6.0/com.vmware.vsphere.upgrade.doc/GUID-1E773360-CB1C-4BC2-B2A4-B73AB5706FAF.html

====================================================


ESXi 6.7 에 대한 보안 + 기타 패치가 새로 업데이트되었습니다.

인텔 CPU 부채널공격 정말 해결이 어렵나 봅니다.

개인 테스트랩으로 쓰고 있는 ESXi 하이퍼바이저 서버 업데이트 했습니다. 


Release Date: MAY 14, 2019

Download Filename:

ESXi670-201905001.zip

Build:

13644319

Download Size:

316.2 MB


VIBs Included

VMware_bootbank_esx-base_6.7.0-2.55.13644319

VMware_bootbank_vsanhealth_6.7.0-2.55.13356305

VMware_bootbank_esx-update_6.7.0-2.55.13644319

VMware_bootbank_vsan_6.7.0-2.55.13356300

PRs Fixed N/A

Related CVE numbers CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091


Install Methoud.


= WEB UI 에서 직접 VIB 업데이트 하는 메뉴도 있던데

저는 고전적인 excli 를 그대로 사용 하겠습니다. 


1) 압축 파일 해제

메뉴얼에 적힌 vib 파일 폴더에서 해당 파일만 Datastore 로 업로드


2. VM 들 다 OFF 하고, 하이퍼바이저 유지보수 모드 후 SSH Shell 진입하기.


[root@test:/vmfs/volumes/5c49dc51-dfefee5c-92f7-e83935b83d84/Linux] pwd

/vmfs/volumes/datastore1/Linux

[root@test:/vmfs/volumes/5c49dc51-dfefee5c-92f7-e83935b83d84/Linux] ls -ltr

total 1249280

-rw-r--r--    1 root     root     962592768 Mar  7 08:32 CentOS-7-x86_64-Minimal-1810.iso

-rw-r--r--    1 root     root     316191859 May 20 10:31 ESXi670-201905001.zip


3. vib 업데이트 실행 후 리부팅. 

#esxcli software vib update --depot /vmfs/volumes/datastore1/Linux/ESXi670-2

01905001.zip

Installation Result

   Message: The update completed successfully, but the system needs to be rebooted for the changes to be effective.

   Reboot Required: true

   VIBs Installed: VMware_bootbank_cpu-microcode_6.7.0-2.55.13644319, VMware_bootbank_esx-base_6.7.0-2.55.13644319, VMware_bootbank_esx-ui_1.33.3-13454473, VMware_bootbank_esx-update_6.7.0-2.55.13644319, VMware_bootbank_vsan_6.7.0-2.55.13356300, VMware_bootbank_vsanhealth_6.7.0-2.55.13356305

   VIBs Removed: VMware_bootbank_cpu-microcode_6.7.0-1.28.10302608, VMware_bootbank_esx-base_6.7.0-2.48.13006603, VMware_bootbank_esx-ui_1.33.3-12923304, VMware_bootbank_esx-update_6.7.0-2.48.13006603, VMware_bootbank_vsan_6.7.0-2.48.12775451, VMware_bootbank_vsanhealth_6.7.0-2.48.12775454

   VIBs Skipped: VMW_bootbank_ata-libata-92_3.00.9.2-16vmw.670.0.0.8169922, VMW_bootbank_ata-pata-amd_0.3.10-3vmw.670.0.0.8169922, VMW_bootbank_ata-pata-atiixp_0.4.6-4vmw.670.0.0.8169922, VMW_bootbank_ata-pata-cmd64x_0.2.5-3vmw.670.0.0.8169922, VMW_bootbank_ata-pata-hpt3x2n_0.3.4-3vmw.670.0.0.8169922, VMW_bootbank_ata-pata-pdc2027x_1.0-3vmw.670.0.0.8169922, VMW_bootbank_ata-pata-serverworks_0.4.3-3vmw.670.0.0.8169922, VMW_bootbank_ata-pata-sil680_0.4.8-3vmw.670.0.0.8169922, VMW_bootbank_ata-pata-via_0.3.3-2vmw.670.0.0.8169922, VMW_bootbank_block-cciss_3.6.14-10vmw.670.0.0.8169922, VMW_bootbank_bnxtnet_20.6.101.7-21vmw.670.2.48.13006603, VMW_bootbank_bnxtroce_20.6.101.0-20vmw.670.1.28.10302608, VMW_bootbank_brcmfcoe_11.4.1078.19-12vmw.670.2.48.13006603, VMW_bootbank_char-random_1.0-3vmw.670.0.0.8169922, VMW_bootbank_ehci-ehci-hcd_1.0-4vmw.670.0.0.8169922, VMW_bootbank_elxiscsi_11.4.1174.0-2vmw.670.0.0.8169922, VMW_bootbank_elxnet_11.4.1095.0-5vmw.670.1.28.10302608, VMW_bootbank_hid-hid_1.0-3vmw.670.0.0.8169922, VMW_bootbank_i40en_1.3.1-23vmw.670.2.48.13006603, VMW_bootbank_iavmd_1.2.0.1011-2vmw.670.0.0.8169922, VMW_bootbank_igbn_0.1.1.0-4vmw.670.2.48.13006603, VMW_bootbank_ima-qla4xxx_2.02.18-1vmw.670.0.0.8169922, VMW_bootbank_ipmi-ipmi-devintf_39.1-5vmw.670.1.28.10302608, VMW_bootbank_ipmi-ipmi-msghandler_39.1-5vmw.670.1.28.10302608, VMW_bootbank_ipmi-ipmi-si-drv_39.1-5vmw.670.1.28.10302608, VMW_bootbank_iser_1.0.0.0-1vmw.670.1.28.10302608, VMW_bootbank_ixgben_1.4.1-18vmw.670.2.48.13006603, VMW_bootbank_lpfc_11.4.33.18-12vmw.670.2.48.13006603, VMW_bootbank_lpnic_11.4.59.0-1vmw.670.0.0.8169922, VMW_bootbank_lsi-mr3_7.708.07.00-2vmw.670.2.48.13006603, VMW_bootbank_lsi-msgpt2_20.00.05.00-1vmw.670.2.48.13006603, VMW_bootbank_lsi-msgpt35_09.00.00.00-1vmw.670.2.48.13006603, VMW_bootbank_lsi-msgpt3_17.00.01.00-3vmw.670.2.48.13006603, VMW_bootbank_misc-cnic-register_1.78.75.v60.7-1vmw.670.0.0.8169922, VMW_bootbank_misc-drivers_6.7.0-2.48.13006603, VMW_bootbank_mtip32xx-native_3.9.8-1vmw.670.1.28.10302608, VMW_bootbank_ne1000_0.8.4-2vmw.670.2.48.13006603, VMW_bootbank_nenic_1.0.21.0-1vmw.670.1.28.10302608, VMW_bootbank_net-bnx2_2.2.4f.v60.10-2vmw.670.0.0.8169922, VMW_bootbank_net-bnx2x_1.78.80.v60.12-2vmw.670.0.0.8169922, VMW_bootbank_net-cdc-ether_1.0-3vmw.670.0.0.8169922, VMW_bootbank_net-cnic_1.78.76.v60.13-2vmw.670.0.0.8169922, VMW_bootbank_net-e1000_8.0.3.1-5vmw.670.0.0.8169922, VMW_bootbank_net-e1000e_3.2.2.1-2vmw.670.0.0.8169922, VMW_bootbank_net-enic_2.1.2.38-2vmw.670.0.0.8169922, VMW_bootbank_net-fcoe_1.0.29.9.3-7vmw.670.0.0.8169922, VMW_bootbank_net-forcedeth_0.61-2vmw.670.0.0.8169922, VMW_bootbank_net-igb_5.0.5.1.1-5vmw.670.0.0.8169922, VMW_bootbank_net-ixgbe_3.7.13.7.14iov-20vmw.670.0.0.8169922, VMW_bootbank_net-libfcoe-92_1.0.24.9.4-8vmw.670.0.0.8169922, VMW_bootbank_net-mlx4-core_1.9.7.0-1vmw.670.0.0.8169922, VMW_bootbank_net-mlx4-en_1.9.7.0-1vmw.670.0.0.8169922, VMW_bootbank_net-nx-nic_5.0.621-5vmw.670.0.0.8169922, VMW_bootbank_net-tg3_3.131d.v60.4-2vmw.670.0.0.8169922, VMW_bootbank_net-usbnet_1.0-3vmw.670.0.0.8169922, VMW_bootbank_net-vmxnet3_1.1.3.0-3vmw.670.2.48.13006603, VMW_bootbank_nfnic_4.0.0.17-0vmw.670.2.48.13006603, VMW_bootbank_nhpsa_2.0.22-3vmw.670.1.28.10302608, VMW_bootbank_nmlx4-core_3.17.13.1-1vmw.670.2.48.13006603, VMW_bootbank_nmlx4-en_3.17.13.1-1vmw.670.2.48.13006603, VMW_bootbank_nmlx4-rdma_3.17.13.1-1vmw.670.2.48.13006603, VMW_bootbank_nmlx5-core_4.17.13.1-1vmw.670.2.48.13006603, VMW_bootbank_nmlx5-rdma_4.17.13.1-1vmw.670.2.48.13006603, VMW_bootbank_ntg3_4.1.3.2-1vmw.670.1.28.10302608, VMW_bootbank_nvme_1.2.2.27-1vmw.670.2.48.13006603, VMW_bootbank_nvmxnet3-ens_2.0.0.21-1vmw.670.0.0.8169922, VMW_bootbank_nvmxnet3_2.0.0.29-1vmw.670.1.28.10302608, VMW_bootbank_ohci-usb-ohci_1.0-3vmw.670.0.0.8169922, VMW_bootbank_pvscsi_0.1-2vmw.670.0.0.8169922, VMW_bootbank_qcnic_1.0.2.0.4-1vmw.670.0.0.8169922, VMW_bootbank_qedentv_2.0.6.4-10vmw.670.1.28.10302608, VMW_bootbank_qfle3_1.0.50.11-9vmw.670.0.0.8169922, VMW_bootbank_qfle3f_1.0.25.0.2-14vmw.670.0.0.8169922, VMW_bootbank_qfle3i_1.0.2.3.9-3vmw.670.0.0.8169922, VMW_bootbank_qflge_1.1.0.11-1vmw.670.0.0.8169922, VMW_bootbank_sata-ahci_3.0-26vmw.670.0.0.8169922, VMW_bootbank_sata-ata-piix_2.12-10vmw.670.0.0.8169922, VMW_bootbank_sata-sata-nv_3.5-4vmw.670.0.0.8169922, VMW_bootbank_sata-sata-promise_2.12-3vmw.670.0.0.8169922, VMW_bootbank_sata-sata-sil24_1.1-1vmw.670.0.0.8169922, VMW_bootbank_sata-sata-sil_2.3-4vmw.670.0.0.8169922, VMW_bootbank_sata-sata-svw_2.3-3vmw.670.0.0.8169922, VMW_bootbank_scsi-aacraid_1.1.5.1-9vmw.670.0.0.8169922, VMW_bootbank_scsi-adp94xx_1.0.8.12-6vmw.670.0.0.8169922, VMW_bootbank_scsi-aic79xx_3.1-6vmw.670.0.0.8169922, VMW_bootbank_scsi-bnx2fc_1.78.78.v60.8-1vmw.670.0.0.8169922, VMW_bootbank_scsi-bnx2i_2.78.76.v60.8-1vmw.670.0.0.8169922, VMW_bootbank_scsi-fnic_1.5.0.45-3vmw.670.0.0.8169922, VMW_bootbank_scsi-hpsa_6.0.0.84-3vmw.670.0.0.8169922, VMW_bootbank_scsi-ips_7.12.05-4vmw.670.0.0.8169922, VMW_bootbank_scsi-iscsi-linux-92_1.0.0.2-3vmw.670.0.0.8169922, VMW_bootbank_scsi-libfc-92_1.0.40.9.3-5vmw.670.0.0.8169922, VMW_bootbank_scsi-megaraid-mbox_2.20.5.1-6vmw.670.0.0.8169922, VMW_bootbank_scsi-megaraid-sas_6.603.55.00-2vmw.670.0.0.8169922, VMW_bootbank_scsi-megaraid2_2.00.4-9vmw.670.0.0.8169922, VMW_bootbank_scsi-mpt2sas_19.00.00.00-2vmw.670.0.0.8169922, VMW_bootbank_scsi-mptsas_4.23.01.00-10vmw.670.0.0.8169922, VMW_bootbank_scsi-mptspi_4.23.01.00-10vmw.670.0.0.8169922, VMW_bootbank_scsi-qla4xxx_5.01.03.2-7vmw.670.0.0.8169922, VMW_bootbank_sfvmk_1.0.0.1003-6vmw.670.2.48.13006603, VMW_bootbank_shim-iscsi-linux-9-2-1-0_6.7.0-0.0.8169922, VMW_bootbank_shim-iscsi-linux-9-2-2-0_6.7.0-0.0.8169922, VMW_bootbank_shim-libata-9-2-1-0_6.7.0-0.0.8169922, VMW_bootbank_shim-libata-9-2-2-0_6.7.0-0.0.8169922, VMW_bootbank_shim-libfc-9-2-1-0_6.7.0-0.0.8169922, VMW_bootbank_shim-libfc-9-2-2-0_6.7.0-0.0.8169922, VMW_bootbank_shim-libfcoe-9-2-1-0_6.7.0-0.0.8169922, VMW_bootbank_shim-libfcoe-9-2-2-0_6.7.0-0.0.8169922, VMW_bootbank_shim-vmklinux-9-2-1-0_6.7.0-0.0.8169922, VMW_bootbank_shim-vmklinux-9-2-2-0_6.7.0-0.0.8169922, VMW_bootbank_shim-vmklinux-9-2-3-0_6.7.0-0.0.8169922, VMW_bootbank_smartpqi_1.0.1.553-12vmw.670.1.28.10302608, VMW_bootbank_uhci-usb-uhci_1.0-3vmw.670.0.0.8169922, VMW_bootbank_usb-storage-usb-storage_1.0-3vmw.670.0.0.8169922, VMW_bootbank_usbcore-usb_1.0-3vmw.670.0.0.8169922, VMW_bootbank_vmkata_0.1-1vmw.670.0.0.8169922, VMW_bootbank_vmkfcoe_1.0.0.1-1vmw.670.1.28.10302608, VMW_bootbank_vmkplexer-vmkplexer_6.7.0-0.0.8169922, VMW_bootbank_vmkusb_0.1-1vmw.670.2.48.13006603, VMW_bootbank_vmw-ahci_1.2.3-1vmw.670.1.28.10302608, VMW_bootbank_xhci-xhci_1.0-3vmw.670.0.0.8169922, VMware_bootbank_elx-esx-libelxima.so_11.4.1184.1-2.48.13006603, VMware_bootbank_esx-dvfilter-generic-fastpath_6.7.0-0.0.8169922, VMware_bootbank_esx-xserver_6.7.0-0.0.8169922, VMware_bootbank_lsu-hp-hpsa-plugin_2.0.0-16vmw.670.1.28.10302608, VMware_bootbank_lsu-intel-vmd-plugin_1.0.0-2vmw.670.1.28.10302608, VMware_bootbank_lsu-lsi-drivers-plugin_1.0.0-1vmw.670.2.48.13006603, VMware_bootbank_lsu-lsi-lsi-mr3-plugin_1.0.0-13vmw.670.1.28.10302608, VMware_bootbank_lsu-lsi-lsi-msgpt3-plugin_1.0.0-9vmw.670.2.48.13006603, VMware_bootbank_lsu-lsi-megaraid-sas-plugin_1.0.0-9vmw.670.0.0.8169922, VMware_bootbank_lsu-lsi-mpt2sas-plugin_2.0.0-7vmw.670.0.0.8169922, VMware_bootbank_lsu-smartpqi-plugin_1.0.0-3vmw.670.1.28.10302608, VMware_bootbank_native-misc-drivers_6.7.0-2.48.13006603, VMware_bootbank_qlnativefc_3.1.8.0-4vmw.670.2.48.13006603, VMware_bootbank_rste_2.0.2.0088-7vmw.670.0.0.8169922, VMware_bootbank_vmware-esx-esxcli-nvme-plugin_1.2.0.36-2.48.13006603, VMware_locker_tools-light_10.3.5.10430147-12986307



# esxcli software vib list             // 우선 기존 패치 버전과 업데이트 날짜 확인

[ 패치전 ] 
vmware-esx-esxcli-nvme-plugin  1.2.0.36-2.48.13006603                VMware  VMwareCertified   2019-04-17
vsan                           6.7.0-2.48.12775451                   VMware  VMwareCertified   2019-04-17
vsanhealth                     6.7.0-2.48.12775454                   VMware  VMwareCertified   2019-04-17
tools-light                    10.3.5.10430147-12986307              VMware  VMwareCertified   2019-04-17


[ 패치 후 리부팅 ] 

#esxcli software vib list | grep 2019-05-20
cpu-microcode                  6.7.0-2.55.13644319                   VMware  VMwareCertified   2019-05-20
esx-base                       6.7.0-2.55.13644319                   VMware  VMwareCertified   2019-05-20
esx-ui                         1.33.3-13454473                       VMware  VMwareCertified   2019-05-20
esx-update                     6.7.0-2.55.13644319                   VMware  VMwareCertified   2019-05-20
vsan                           6.7.0-2.55.13356300                   VMware  VMwareCertified   2019-05-20
vsanhealth                     6.7.0-2.55.13356305                   VMware  VMwareCertified   2019-05-20


업데이트 정상적으로 완료 되었습니다.
유지보수모드 해제하고 다시 VM 올리도록 합시다...



블로그 이미지

늙은M군

개인 저장공간입니다. 해당 일부 과정들을 공인 인터넷 환경에서 악성적으로 응용할 시 피해가 발생할 수 있으며, 그에 대해 책임은 사용자에게 있습니다!! 주의해주세요.

,







[ 최신 업데이트 + 보안 ] 

업데이트 후에도 보안경고 계속 뜨면 ( CVE-2018-3646 )  커널값 변경 후 리부팅. 

https://kb.vmware.com/s/article/55806 


(요약)

ESXi 6.7u2 (and later) Scheduler Configuration Summary

System Advance Option ( 관리 - 시스템 - 고급 설정 - 커널값 검색 ) 


hyperthreadingMitigation  = true  

hyperthreadingMitigationIntraVM = false

상기 취약점 공격의 완화는 업데이트 및 패치를 통해 진행됩니다. 해당 설정은 성능에 큰 영향을 미치지 않습니다. 이 공격을 완화하려면 ESXi- Side Channel-Aware-Scheduler 라고 하는 새 기능의 커널 설정이 필요합니다. 이 기능은 하이퍼 쓰레딩이 가능한 하나의 논리 코어에 영향을 미치지만, 성능에는 별다른 지장이 없으며, 디폴트 값은 활성화되어 있지 않습니다.

취약점 ( Attack Vector ) 은 악의적인 게스트 VM이 L1 캐시에 있는 영역의 타 VM의 데이터를 잠재적으로 취득할 수 있는 공격



ESXi 6.7 Update 2 패치 

https://docs.vmware.com/en/VMware-vSphere/6.7/rn/vsphere-esxi-67u2-release-notes.html


[ 목표 ]

 zip 를 받아서 SSH 내부에서 업데이트 


[ 과정 ] 

esxcli system maintenanceMode set --enable true

esxcli network firewall ruleset set -e true -r httpClient

wget 사용 가능해짐.


다운로드 다 하면 다시 방화벽 올림

esxcli network firewall ruleset set -e false -r httpClient


[ 패치 후 리부팅 ] 

esxcli software vib update -d /vmfs/volumes/datastore1/patch/update-from-esxi6.7-6.7_update02.zip

reboot






블로그 이미지

늙은M군

개인 저장공간입니다. 해당 일부 과정들을 공인 인터넷 환경에서 악성적으로 응용할 시 피해가 발생할 수 있으며, 그에 대해 책임은 사용자에게 있습니다!! 주의해주세요.

,