VMware has just released a new update for its vCenter Server 5.5 that fixes a couple of vulnerabilities including the well known CVE-2014-0224 that affects some versions of the OpenSSL libraries allowing a possibile man-in-the-middle attack.
The other fixed issues are:
Server Configuration
- Host profile answer file might not be applied when you reboot the ESXi host . After you restart the vCenter services, if you use Auto Deploy to reboot a stateless ESXi host, the host profile answer file might not be applied to the ESXi host and the host configuration might fail. This issue occurs if the reference host is not available. This issue is resolved in this release.
Virtual SAN
- Under certain conditions, Virtual SAN storage providers might not be created automatically after you enable Virtual SAN on a cluster . When you enable Virtual SAN on a cluster, Virtual SAN might fail to automatically configure and register storage providers for the hosts in the cluster, even after you perform a resynchronization operation. This issue is resolved in this release. You can view the Virtual SAN storage providers after resynchronization. To resynchronize, click the synchronize icon in the Storage Providers tab.