Reading Time: < 1 minuteRecently VMware has released a few security patches that will prevent a guest from execute code on the ESXi host and breaking the isolation of a virtual machine.
This has been possible based on heap buffer overflow and uninitialized stack memory usage in SVGA, using this bug may allow a guest to execute code on the host.
Note that this particular issue impacts ESXi 6.0 or later as also latest version of VMware Workstation, Player and Fusion.
Available VMware KB articles for these issues are:
Here the complete status of the affected versions:

For more informations see the VMware Security Advisories VMSA-2017-0006.
Related Posts
VMware ESXi 5.0 Patch ESXi500-201111401-BGVMware ha da poco rilasciato una patch per ESXi™ 5.0, che risolve il seguente problema: The software iSCSI slow boot issue resolved (descritto in VMware KB 2007108) Per maggiori informazioni vedere le note di rilascio della patch per ESXi 5.0.A new VMware® ESXi™ 5.0 Patch…
-
-
VMware acquires E8 SecurityVMware has acquired the technology and team of E8 Security. With this acquisition, VMware is further reinforcing its commitment to deliver the industry’s first intelligence-driven digital workspace to empower the employee experience and drive predictive security. Adding E8 Security’s capabilities to VMware's digital workspace platform,…