Name | CVE-2022-31676 |
Description | VMware Tools (12.0.0, 11.x.y and 10.x.y) contains a local privilege escalation vulnerability. A malicious actor with local non-administrative access to the Guest OS can escalate privileges as a root user in the virtual machine. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3081-1, DSA-5215-1 |
Debian Bugs | 1018012 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
open-vm-tools (PTS) | bullseye (security), bullseye | 2:11.2.5-2+deb11u3 | fixed |
| bookworm, bookworm (security) | 2:12.2.0-1+deb12u2 | fixed |
| sid, trixie | 2:12.4.5-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
Fixed by: https://github.com/vmware/open-vm-tools/commit/70a74758bfe0042c27f15ce590fb21a2bc54d745 (stable-12.1.0)
https://github.com/vmware/open-vm-tools/blob/CVE-2022-31676.patch/1205-Properly-check-authorization-on-incoming-guestOps-re.patch
https://www.vmware.com/security/advisories/VMSA-2022-0024.html