UbuntuUpdates.org

Package "open-vm-tools"

Name: open-vm-tools

Description:

Open VMware Tools for virtual machines hosted on VMware (CLI)

Latest version: 2:12.1.5-3ubuntu0.23.04.3
Release: lunar (23.04)
Level: updates
Repository: main
Homepage: https://github.com/vmware/open-vm-tools

Links


Download "open-vm-tools"


Other versions of "open-vm-tools" in Lunar

Repository Area Version
base main 2:12.1.5-3
base universe 2:12.1.5-3
security universe 2:12.1.5-3ubuntu0.23.04.3
security main 2:12.1.5-3ubuntu0.23.04.3
updates universe 2:12.1.5-3ubuntu0.23.04.3
PPA: Mint Upstream 2:11.3.5-1ubuntu5mint1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2:12.1.5-3ubuntu0.23.04.3 2023-11-01 18:06:55 UTC

  open-vm-tools (2:12.1.5-3ubuntu0.23.04.3) lunar-security; urgency=medium

  * SECURITY UPDATE: SAML Bypass
    - debian/patches/CVE-2023-34058.patch: don't accept tokens with
      unrelated certs in open-vm-tools/vgauth/common/certverify.c,
      open-vm-tools/vgauth/common/certverify.h,
      open-vm-tools/vgauth/common/prefs.h,
      open-vm-tools/vgauth/serviceImpl/saml-xmlsec1.c.
    - CVE-2023-34058
  * SECURITY UPDATE: file descriptor hijack
    - debian/patches/CVE-2023-34059.patch: change privilege dropping order
      in open-vm-tools/services/vmtoolsd/mainPosix.c,
      open-vm-tools/vmware-user-suid-wrapper/main.c.
    - CVE-2023-34059

 -- Marc Deslauriers <email address hidden> Fri, 27 Oct 2023 07:37:42 -0400

Source diff to previous version
CVE-2023-34058 VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges https://docs.v

Version: 2:12.1.5-3ubuntu0.23.04.2 2023-09-13 18:07:53 UTC

  open-vm-tools (2:12.1.5-3ubuntu0.23.04.2) lunar-security; urgency=medium

  * SECURITY UPDATE: SAML token signature bypass vulnerability
    - debian/patches/CVE-2023-20900.patch: Allow only X509 certs to verify
      the SAML token signature in
      open-vm-tools/vgauth/serviceImpl/saml-xmlsec1.c.
    - CVE-2023-20900

 -- Marc Deslauriers <email address hidden> Mon, 11 Sep 2023 14:45:11 -0400

Source diff to previous version
CVE-2023-20900 A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E

Version: 2:12.1.5-3ubuntu0.23.04.1 2023-07-27 07:07:04 UTC

  open-vm-tools (2:12.1.5-3ubuntu0.23.04.1) lunar-security; urgency=medium

  * SECURITY UPDATE: authentication bypass vulnerability
    - debian/patches/CVE-2023-20867.patch: Remove some dead code
    - CVE-2023-20867

 -- Nishit Majithia <email address hidden> Tue, 25 Jul 2023 09:39:44 +0530

CVE-2023-20867 A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of



About   -   Send Feedback to @ubuntu_updates