oss-sec mailing list archives
Re: CVE-2025-22247 - Insecure file handling vulnerability in open-vm-tools
From: Matthew Fernandez <matthew.fernandez () gmail com>
Date: Thu, 25 Sep 2025 12:08:58 -0700
On 9/24/25 23:38, VMware PSIRT wrote:
Hi Alexander, We somehow missed your previous e-mail. Thank you for reviving this thread. Please see our responses below:Skimming the code changes, I see that the second part - "disallowunexpected symlinks in file paths" - is implemented by calling realpath() (or a Windows function on that platform) and seeing whether that changed the pathname or (almost) not. However, this will not disallow a symlink that appears after the realpath() call but before subsequent use of the pathname. Thanks you for raising this. You are right about realpath() and symlink usage in general. However, as you can see we are performing realpath() check after we completed the open() but before we read anything from the file. So, there is no use of pathname after realpath() call here.
Is this not now simply vulnerable to the opposite race? 1. Attacker creates unexpected symlink 2. open() 3. Attacker overwrites symlink with something benign 4. realpath(), sees nothing suspiciousYou now have an open FD through the unexpected symlink without having detected it.
Current thread:
- Re: CVE-2025-22247 - Insecure file handling vulnerability in open-vm-tools Solar Designer (Sep 23)
- Re: CVE-2025-22247 - Insecure file handling vulnerability in open-vm-tools VMware PSIRT (Sep 25)
- Re: CVE-2025-22247 - Insecure file handling vulnerability in open-vm-tools Matthew Fernandez (Sep 25)
- Re: CVE-2025-22247 - Insecure file handling vulnerability in open-vm-tools Jacob Bachmeyer (Sep 25)
- Re: CVE-2025-22247 - Insecure file handling vulnerability in open-vm-tools VMware PSIRT (Sep 25)
