- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3646-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                   Bastien Roucariès
November 05, 2023                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : open-vm-tools
Version        : 2:10.3.10-1+deb10u6
CVE ID         : CVE-2023-34058 CVE-2023-34059
Debian Bug     : 1054666

Brief introduction 

CVE-2023-34058

    A file descriptor hijack vulnerability was found in
    the vmware-user-suid-wrapper command.
    A malicious actor with non-root privileges might have been able
    to hijack the /dev/uinput file descriptor allowing
    them to simulate user inputs.

CVE-2023-34059

    A SAML Token Signature Bypass vulnerability was found.
    A malicious actor that has been granted Guest Operation Privileges
    in a target virtual machine might have been able to
    elevate their privileges if that target
    virtual machine has been assigned a more privileged Guest Alias.

For Debian 10 buster, these problems have been fixed in version
2:10.3.10-1+deb10u6.

We recommend that you upgrade your open-vm-tools packages.

For the detailed security status of open-vm-tools please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/open-vm-tools

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-3646-1: open-vm-tools security update

November 5, 2023
Brief introduction CVE-2023-34058

Summary

CVE-2023-34058

A file descriptor hijack vulnerability was found in
the vmware-user-suid-wrapper command.
A malicious actor with non-root privileges might have been able
to hijack the /dev/uinput file descriptor allowing
them to simulate user inputs.

CVE-2023-34059

A SAML Token Signature Bypass vulnerability was found.
A malicious actor that has been granted Guest Operation Privileges
in a target virtual machine might have been able to
elevate their privileges if that target
virtual machine has been assigned a more privileged Guest Alias.

For Debian 10 buster, these problems have been fixed in version
2:10.3.10-1+deb10u6.

We recommend that you upgrade your open-vm-tools packages.

For the detailed security status of open-vm-tools please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/open-vm-tools

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : open-vm-tools
Version : 2:10.3.10-1+deb10u6
CVE ID : CVE-2023-34058 CVE-2023-34059
Debian Bug : 1054666

Related News

News

Powered By

Footer Logo

Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.

Powered By

Footer Logo