[SECURITY] [DLA 3646-1] open-vm-tools security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3646-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Bastien Roucariès
November 05, 2023 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : open-vm-tools
Version : 2:10.3.10-1+deb10u6
CVE ID : CVE-2023-34058 CVE-2023-34059
Debian Bug : 1054666
Brief introduction
CVE-2023-34058
A file descriptor hijack vulnerability was found in
the vmware-user-suid-wrapper command.
A malicious actor with non-root privileges might have been able
to hijack the /dev/uinput file descriptor allowing
them to simulate user inputs.
CVE-2023-34059
A SAML Token Signature Bypass vulnerability was found.
A malicious actor that has been granted Guest Operation Privileges
in a target virtual machine might have been able to
elevate their privileges if that target
virtual machine has been assigned a more privileged Guest Alias.
For Debian 10 buster, these problems have been fixed in version
2:10.3.10-1+deb10u6.
We recommend that you upgrade your open-vm-tools packages.
For the detailed security status of open-vm-tools please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/open-vm-tools
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
iQJFBAEBCgAvFiEEXQGHuUCiRbrXsPVqADoaLapBCF8FAmVIFJoRHHJvdWNhQGRl
Ymlhbi5vcmcACgkQADoaLapBCF8jiBAAo1u0kx7UJLY1rjo8XMk0UAbQ7gnzBVXU
O47pP7Z53HJ+7JT+Hmmk6bRI0gwVnQQPeea7kqFOBdX99jwccrnAtkc1gY8/uSzl
xvgKH2eEq8FPeuMC2kWE+qYWpyLFD1OMoBFEF15a324FfaZM8ohfACC99xn1uz9M
+K16eVrmFR2+8LniPoTPWWGaQaLg7B5pse5KGPaLMlDDWTHmOkbEmeVoxB6FC0qv
/e/09zDgwHz9Z7L2YNXcKmI4Wp1n35sSAQPDvW720sppAER/pJ0Ez+qUePj9fiL5
FIA/4GnbPDuUxuvPPR0CXSpPvRdEv0f0vq7rmqQqceWMXt10ESH8OoiKAgbvHzib
3p7wd769ts8br2JVQoOMeYi3UQJFzupBtgzIfcCvIiHS/Pl+wY+Ku2xHcY9/FGCn
Fwk8d0Rm4E83JJ2k9mJkjo9yAnCQIaIAqVYByeDhaXdB/Gy9z8j04hQky5mBs5xh
KB0xJhdnAdNqhucNX01XpOJTrktjspAtPdyBW+Z+Lv25HX59VubtnbT5mTLKWize
BCe5nKrvHAKuWr/HDNOACduVEJbizaMpX4EhMOs+2n57QgCV4ienPZOK6Mc56yyI
itoisUFg8ZBtaZxpCwjK1Wo30NuJgjvYIOrk095AjrfTODCiO+hKJ+bN15s6ttuI
7H/83gWnHWI=
=0q1C
-----END PGP SIGNATURE-----
Reply to: