UbuntuUpdates.org

Package "open-vm-tools-dev"

Name: open-vm-tools-dev

Description:

Open VMware Tools for virtual machines hosted on VMware (development)

Latest version: 2:11.3.0-2ubuntu0~ubuntu20.04.7
Release: focal (20.04)
Level: security
Repository: main
Head package: open-vm-tools
Homepage: https://github.com/vmware/open-vm-tools

Links


Download "open-vm-tools-dev"


Other versions of "open-vm-tools-dev" in Focal

Repository Area Version
base main 2:11.0.5-4
updates main 2:11.3.0-2ubuntu0~ubuntu20.04.7
PPA: Mint Upstream 2:11.3.5-1ubuntu5mint1

Changelog

Version: 2:11.3.0-2ubuntu0~ubuntu20.04.7 2023-10-31 17:13:34 UTC

  open-vm-tools (2:11.3.0-2ubuntu0~ubuntu20.04.7) focal-security; urgency=medium

  * SECURITY UPDATE: SAML Bypass
    - debian/patches/CVE-2023-34058.patch: don't accept tokens with
      unrelated certs in open-vm-tools/vgauth/common/certverify.c,
      open-vm-tools/vgauth/common/certverify.h,
      open-vm-tools/vgauth/common/prefs.h,
      open-vm-tools/vgauth/serviceImpl/saml-xmlsec1.c.
    - CVE-2023-34058
  * SECURITY UPDATE: file descriptor hijack
    - debian/patches/CVE-2023-34059.patch: change privilege dropping order
      in open-vm-tools/services/vmtoolsd/mainPosix.c,
      open-vm-tools/vmware-user-suid-wrapper/main.c.
    - CVE-2023-34059

 -- Marc Deslauriers <email address hidden> Fri, 27 Oct 2023 07:51:55 -0400

Source diff to previous version
CVE-2023-34058 VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges https://docs.v

Version: 2:11.3.0-2ubuntu0~ubuntu20.04.6 2023-09-13 16:09:58 UTC

  open-vm-tools (2:11.3.0-2ubuntu0~ubuntu20.04.6) focal-security; urgency=medium

  * SECURITY UPDATE: SAML token signature bypass vulnerability
    - debian/patches/CVE-2023-20900.patch: Allow only X509 certs to verify
      the SAML token signature in
      open-vm-tools/vgauth/serviceImpl/saml-xmlsec1.c.
    - CVE-2023-20900

 -- Marc Deslauriers <email address hidden> Mon, 11 Sep 2023 14:46:25 -0400

Source diff to previous version
CVE-2023-20900 A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E

Version: 2:11.3.0-2ubuntu0~ubuntu20.04.5 2023-07-27 06:07:01 UTC

  open-vm-tools (2:11.3.0-2ubuntu0~ubuntu20.04.5) focal-security; urgency=medium

  * SECURITY UPDATE: authentication bypass vulnerability
    - debian/patches/CVE-2023-20867.patch: Remove some dead code
    - CVE-2023-20867

 -- Nishit Majithia <email address hidden> Tue, 25 Jul 2023 09:36:54 +0530

Source diff to previous version
CVE-2023-20867 A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of

Version: 2:11.3.0-2ubuntu0~ubuntu20.04.3 2022-08-24 13:07:10 UTC

  open-vm-tools (2:11.3.0-2ubuntu0~ubuntu20.04.3) focal-security; urgency=medium

  * SECURITY UPDATE: local privilege escalation
    - debian/patches/CVE-2022-31676.patch: check authorization on incoming
      guestOps requests in open-vm-tools/vgauth/serviceImpl/proto.c.
    - CVE-2022-31676

 -- Marc Deslauriers <email address hidden> Tue, 16 Aug 2022 09:23:06 -0400

CVE-2022-31676 VMware Tools (12.0.0, 11.x.y and 10.x.y) contains a local privilege es ...



About   -   Send Feedback to @ubuntu_updates