-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Low: open-vm-tools security update Advisory ID: RHSA-2023:3945-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:3945 Issue date: 2023-06-29 CVE Names: CVE-2023-20867 ===================================================================== 1. Summary: An update for open-vm-tools is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream AUS (v. 8.2) - x86_64 Red Hat Enterprise Linux AppStream E4S (v. 8.2) - x86_64 Red Hat Enterprise Linux AppStream TUS (v. 8.2) - x86_64 3. Description: The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines. Security Fix(es): * open-vm-tools: authentication bypass vulnerability in the vgauth module (CVE-2023-20867) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2213087 - CVE-2023-20867 open-vm-tools: authentication bypass vulnerability in the vgauth module 6. Package List: Red Hat Enterprise Linux AppStream AUS (v. 8.2): Source: open-vm-tools-11.0.0-4.el8_2.2.src.rpm x86_64: open-vm-tools-11.0.0-4.el8_2.2.x86_64.rpm open-vm-tools-debuginfo-11.0.0-4.el8_2.2.x86_64.rpm open-vm-tools-debugsource-11.0.0-4.el8_2.2.x86_64.rpm open-vm-tools-desktop-11.0.0-4.el8_2.2.x86_64.rpm open-vm-tools-desktop-debuginfo-11.0.0-4.el8_2.2.x86_64.rpm open-vm-tools-test-debuginfo-11.0.0-4.el8_2.2.x86_64.rpm Red Hat Enterprise Linux AppStream E4S (v. 8.2): Source: open-vm-tools-11.0.0-4.el8_2.2.src.rpm x86_64: open-vm-tools-11.0.0-4.el8_2.2.x86_64.rpm open-vm-tools-debuginfo-11.0.0-4.el8_2.2.x86_64.rpm open-vm-tools-debugsource-11.0.0-4.el8_2.2.x86_64.rpm open-vm-tools-desktop-11.0.0-4.el8_2.2.x86_64.rpm open-vm-tools-desktop-debuginfo-11.0.0-4.el8_2.2.x86_64.rpm open-vm-tools-test-debuginfo-11.0.0-4.el8_2.2.x86_64.rpm Red Hat Enterprise Linux AppStream TUS (v. 8.2): Source: open-vm-tools-11.0.0-4.el8_2.2.src.rpm x86_64: open-vm-tools-11.0.0-4.el8_2.2.x86_64.rpm open-vm-tools-debuginfo-11.0.0-4.el8_2.2.x86_64.rpm open-vm-tools-debugsource-11.0.0-4.el8_2.2.x86_64.rpm open-vm-tools-desktop-11.0.0-4.el8_2.2.x86_64.rpm open-vm-tools-desktop-debuginfo-11.0.0-4.el8_2.2.x86_64.rpm open-vm-tools-test-debuginfo-11.0.0-4.el8_2.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2023-20867 https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZJ2oVdzjgjWX9erEAQj59w/+M3Pbn+GzRtcSgV+55cwHJIKuOScS0mXS KhqlK8mpuqR1q3LpveNeSj+CTHL9hKff1erHfxU913bRl2K+QApKD6JzjKWvgtMp fC5d+ZAIJmoDMnVCww9KfztHtl0d8TGrwHxCr+wFH//tYW/3GqiSdPchZ7h1TuUc Wq0O/oLOdGA4FavBI4r/GESUczuMnapflYR7/nQMPgkpUT3Sv9SWG1MtX77x7DQO RvipuYKKRBHa+VfkdhVGmVmR0wseI7TEImlzW3rGlPWMUB53iDK+4ixBddgPbFQs ZUD41PitzDsDLwxwd3aA+Xv7VXLuniy5gSoCJlpL3P25B4icXu/5E7RyCOGbEqzv yGwrsgJnXh7+akd0/pF2chwSTwAJWhA1WD3HTIWp+z0npRcMAbPQIYG0RLFHpss/ dfhOgI0kWiBT0sx1Ng6vo2FLRzXcYPzlUXfvIHJIy8PGBA4o2gMrDBnakNYQKG+U D0o8h87Bic+wmTWG6fyBInSbKgp1o6URrK7f91YHJmFWyjg7YfG1ABRBCQnjvoKy qmX1CTKJ5GWrOL8p5sOcYnKks9O4nLmBcI4lsejd/xWQJ8fffqM+M51RCey7Ly1/ vlsDQ82uWL+tZl0XpEL0wD7+bEdBzw2Elh+EKZQbu0cHnhPEc2z4/laqiz4ojjwe 3+8Mo9+OHi4= =NzVw -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce