CVE-2023-20900 (https://www.vmware.com/security/advisories/VMSA-2023-0019.html): A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html . CVE-2023-34058 (https://www.vmware.com/security/advisories/VMSA-2023-0024.html): VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html . CVE-2023-34059 (https://www.vmware.com/security/advisories/VMSA-2023-0024.html): open-vm-tools contains a file descriptor hijack vulnerability in the vmware-user-suid-wrapper. A malicious actor with non-root privileges may be able to hijack the /dev/uinput file descriptor allowing them to simulate user inputs. Matthias Gerstner notes that CVE-2023-34059 doesn't seem to be fixed. Looking closer, it doesn't *seem* like CVE-2023-34058 is fixed in 12.3.0 either, but rather in 12.3.5? At least the commits only seem to appear in history just before the 12.3.5 release: https://github.com/vmware/open-vm-tools/commits/stable-12.3.x
CVE-2023-20900 is fixed in 12.3.0 and 12.3.5, patch is in as 74b6d0d9000eda1a2c8f31c40c725fb0b8520b16.
CVE-2023-34058 seems to be fixed in 1bfe23d728b74e08f4f65cd9b0093ca73937003a, which is in 12.3.5.
CVE-2023-34059 seemingly has its patch in 12.3.5 too: https://github.com/vmware/open-vm-tools/commit/63f7c79c4aecb14d37cc4ce9da509419e31d394f Asking for more info from Matthias on oss-security.
Yes, it seems I misunderstood him and that these are fixed.