Release date: August 04, 2016
Important: Always upgrade vCenter Server to version 5.5 Update 3b or later before you update ESXi to ESXi 5.5 Patch [ESXi550-201608001] released on 08/04/2016 to avoid issues due to interoperability implication relating to SSLv3 disablement.
Support for SSLv3 protocol is disabled by default
Note: In your vSphere environment, you need to update vCenter Server to vCenter Server 5.5 Update 3b or later before updating ESXi to ESXi 5.5 Patch [ESXi550-201608001] released on 08/04/2016. vCenter Server will not be able to manage ESXi 5.5 Patch [ESXi550-201608001] released on 08/04/2016, if you update ESXi before updating vCenter Server to version 5.5 Update 3b or later. For more information about the sequence in which vSphere environments need to be updated, refer KB 2057795.
VMware highly recommends you to update ESXi hosts to ESXi 5.5 Patch [ESXi550-201608001] released on 08/04/2016 while managing them from vCenter Server 5.5 Update 3b or later.
VMware does not recommend re-enabling SSLv3 due to POODLE vulnerability. If at all you need to enable SSLv3, you need to enable the SSLv3 protocol for all components. For more information, refer KB 2139396.
Patch Category | Bugfix |
Patch Severity | Critical |
Build | For build information, see KB 2144359. |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included | VMware:esx-base:5.5.0:3.89.4179633 |
PRs Fixed | 1383229, 1397634, 1416182, 1427564, 1494682, 1495758, 1503452, 1513465, 1514017, 1516392, 1518156, 1521738, 1526733, 1530370, 1537096, 1548243, 1555227, 1557766, 1558552, 1561813, 1561897, 1565079, 1568399, 1574630, 1580012, 1598321, 1604792, 1615579, 1623172, 1626383, 1627958, 1639847 |
Related CVE numbers | NA |