![]() |
|
Message-ID: <CADOAh9cRx64wR8a7X7918ma_nkYDXzQ8uK6Jsp0q4oe-ECr3Eg@mail.gmail.com> Date: Mon, 12 May 2025 18:57:46 +0530 From: VMware PSIRT <vmware.psirt@...adcom.com> To: oss-security@...ts.openwall.com Subject: CVE-2025-22247 - Insecure file handling vulnerability in open-vm-tools Description ============================================================== CVE-2025-22247: open-vm-tools contains an insecure file handling vulnerability. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 6.1 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N. Known Attack Vectors ============================================================== A malicious actor with non-administrative privileges on a guest VM may tamper the local files to trigger insecure file operations within that VM. Remediation ============================================================== The following patches are provided for released versions of open-vm-tools: https://github.com/vmware/open-vm-tools/tree/CVE-2025-22247.patch The patches have been tested against the above open-vm-tools releases. Each applies cleanly with: git am for a git repository. patch -p2 in the top directory of an open-vm-tools source tree. ============================================================== ------ Thanks, Praveen Singh Broadcom PSIRT - VCF Division vmware.psirt@...adcom.com -- This electronic communication and the information and any files transmitted with it, or attached to it, are confidential and are intended solely for the use of the individual or entity to whom it is addressed and may contain information that is confidential, legally privileged, protected by privacy laws, or otherwise restricted from disclosure to anyone else. If you are not the intended recipient or the person responsible for delivering the e-mail to the intended recipient, you are hereby notified that any use, copying, distributing, dissemination, forwarding, printing, or copying of this e-mail is strictly prohibited. If you received this e-mail in error, please return the e-mail to the sender, delete it from your computer, and destroy any printed copy of it.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.