{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for open-vm-tools","title":"Title of the patch"},{"category":"description","text":"This update for open-vm-tools fixes the following issues:\n\nUpdate to 12.3.0 (build 22234872) (bsc#1214850)\n\n- There are no new features in the open-vm-tools 12.3.0 release. This is\n  primarily a maintenance release that addresses a few critical problems,\n  including:\n  - This release integrates CVE-2023-20900 without the need for a patch.\n    For more information on this vulnerability and its impact on VMware\n    products, see\n    https://www.vmware.com/security/advisories/VMSA-2023-0019.html.\n  - A tools.conf configuration setting is available to temporaily direct\n    Linux quiesced snaphots to restore pre open-vm-tools 12.2.0 behavior\n    of ignoring file systems already frozen.\n  - Building of the VMware Guest Authentication Service (VGAuth) using\n    'xml-security-c' and 'xerces-c' is being deprecated.\n  - A number of Coverity reported issues have been addressed.\n  - A number of GitHub issues and pull requests have been handled.\n    Please see the Resolves Issues section of the Release Notes.\n  - For issues resolved in this release, see the Resolved Issues section\n    of the Release Notes.\n- For complete details, see:\n  https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.0\n- Release Notes are available at\n  https://github.com/vmware/open-vm-tools/blob/stable-12.3.0/ReleaseNotes.md\n- The granular changes that have gone into the 12.3.0 release are in the\n  ChangeLog at\n  https://github.com/vmware/open-vm-tools/blob/stable-12.3.0/open-vm-tools/ChangeLog\n- Fix (bsc#1205927) - hv_vmbus module is loaded unnecessarily in VMware guests\n- jsc#PED-1344 - reinable building containerinfo plugin for SLES 15 SP4.\n","title":"Description of the patch"},{"category":"details","text":"SUSE-2023-3795,SUSE-SLE-SERVER-12-SP5-2023-3795","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3795-1.json"},{"category":"self","summary":"URL for SUSE-SU-2023:3795-1","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233795-1/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2023:3795-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2023-September/016333.html"},{"category":"self","summary":"SUSE Bug 1205927","url":"https://bugzilla.suse.com/1205927"},{"category":"self","summary":"SUSE Bug 1214850","url":"https://bugzilla.suse.com/1214850"},{"category":"self","summary":"SUSE CVE CVE-2023-20900 page","url":"https://www.suse.com/security/cve/CVE-2023-20900/"}],"title":"Security update for open-vm-tools","tracking":{"current_release_date":"2023-09-26T16:06:28Z","generator":{"date":"2023-09-26T16:06:28Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2023:3795-1","initial_release_date":"2023-09-26T16:06:28Z","revision_history":[{"date":"2023-09-26T16:06:28Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"libvmtools-devel-12.3.0-4.59.1.aarch64","product":{"name":"libvmtools-devel-12.3.0-4.59.1.aarch64","product_id":"libvmtools-devel-12.3.0-4.59.1.aarch64"}},{"category":"product_version","name":"libvmtools0-12.3.0-4.59.1.aarch64","product":{"name":"libvmtools0-12.3.0-4.59.1.aarch64","product_id":"libvmtools0-12.3.0-4.59.1.aarch64"}},{"category":"product_version","name":"open-vm-tools-12.3.0-4.59.1.aarch64","product":{"name":"open-vm-tools-12.3.0-4.59.1.aarch64","product_id":"open-vm-tools-12.3.0-4.59.1.aarch64"}},{"category":"product_version","name":"open-vm-tools-desktop-12.3.0-4.59.1.aarch64","product":{"name":"open-vm-tools-desktop-12.3.0-4.59.1.aarch64","product_id":"open-vm-tools-desktop-12.3.0-4.59.1.aarch64"}},{"category":"product_version","name":"open-vm-tools-sdmp-12.3.0-4.59.1.aarch64","product":{"name":"open-vm-tools-sdmp-12.3.0-4.59.1.aarch64","product_id":"open-vm-tools-sdmp-12.3.0-4.59.1.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"libvmtools-devel-12.3.0-4.59.1.i586","product":{"name":"libvmtools-devel-12.3.0-4.59.1.i586","product_id":"libvmtools-devel-12.3.0-4.59.1.i586"}},{"category":"product_version","name":"libvmtools0-12.3.0-4.59.1.i586","product":{"name":"libvmtools0-12.3.0-4.59.1.i586","product_id":"libvmtools0-12.3.0-4.59.1.i586"}},{"category":"product_version","name":"open-vm-tools-12.3.0-4.59.1.i586","product":{"name":"open-vm-tools-12.3.0-4.59.1.i586","product_id":"open-vm-tools-12.3.0-4.59.1.i586"}},{"category":"product_version","name":"open-vm-tools-desktop-12.3.0-4.59.1.i586","product":{"name":"open-vm-tools-desktop-12.3.0-4.59.1.i586","product_id":"open-vm-tools-desktop-12.3.0-4.59.1.i586"}},{"category":"product_version","name":"open-vm-tools-sdmp-12.3.0-4.59.1.i586","product":{"name":"open-vm-tools-sdmp-12.3.0-4.59.1.i586","product_id":"open-vm-tools-sdmp-12.3.0-4.59.1.i586"}}],"category":"architecture","name":"i586"},{"branches":[{"category":"product_version","name":"libvmtools-devel-12.3.0-4.59.1.x86_64","product":{"name":"libvmtools-devel-12.3.0-4.59.1.x86_64","product_id":"libvmtools-devel-12.3.0-4.59.1.x86_64"}},{"category":"product_version","name":"libvmtools0-12.3.0-4.59.1.x86_64","product":{"name":"libvmtools0-12.3.0-4.59.1.x86_64","product_id":"libvmtools0-12.3.0-4.59.1.x86_64"}},{"category":"product_version","name":"open-vm-tools-12.3.0-4.59.1.x86_64","product":{"name":"open-vm-tools-12.3.0-4.59.1.x86_64","product_id":"open-vm-tools-12.3.0-4.59.1.x86_64"}},{"category":"product_version","name":"open-vm-tools-desktop-12.3.0-4.59.1.x86_64","product":{"name":"open-vm-tools-desktop-12.3.0-4.59.1.x86_64","product_id":"open-vm-tools-desktop-12.3.0-4.59.1.x86_64"}},{"category":"product_version","name":"open-vm-tools-salt-minion-12.3.0-4.59.1.x86_64","product":{"name":"open-vm-tools-salt-minion-12.3.0-4.59.1.x86_64","product_id":"open-vm-tools-salt-minion-12.3.0-4.59.1.x86_64"}},{"category":"product_version","name":"open-vm-tools-sdmp-12.3.0-4.59.1.x86_64","product":{"name":"open-vm-tools-sdmp-12.3.0-4.59.1.x86_64","product_id":"open-vm-tools-sdmp-12.3.0-4.59.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Server 12 SP5","product":{"name":"SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5","product_identification_helper":{"cpe":"cpe:/o:suse:sles:12:sp5"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server for SAP Applications 12 SP5","product":{"name":"SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_identification_helper":{"cpe":"cpe:/o:suse:sles_sap:12:sp5"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"libvmtools0-12.3.0-4.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:libvmtools0-12.3.0-4.59.1.x86_64"},"product_reference":"libvmtools0-12.3.0-4.59.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"open-vm-tools-12.3.0-4.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:open-vm-tools-12.3.0-4.59.1.x86_64"},"product_reference":"open-vm-tools-12.3.0-4.59.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"open-vm-tools-desktop-12.3.0-4.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:open-vm-tools-desktop-12.3.0-4.59.1.x86_64"},"product_reference":"open-vm-tools-desktop-12.3.0-4.59.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"open-vm-tools-salt-minion-12.3.0-4.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:open-vm-tools-salt-minion-12.3.0-4.59.1.x86_64"},"product_reference":"open-vm-tools-salt-minion-12.3.0-4.59.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"open-vm-tools-sdmp-12.3.0-4.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:open-vm-tools-sdmp-12.3.0-4.59.1.x86_64"},"product_reference":"open-vm-tools-sdmp-12.3.0-4.59.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"libvmtools0-12.3.0-4.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvmtools0-12.3.0-4.59.1.x86_64"},"product_reference":"libvmtools0-12.3.0-4.59.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"open-vm-tools-12.3.0-4.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:open-vm-tools-12.3.0-4.59.1.x86_64"},"product_reference":"open-vm-tools-12.3.0-4.59.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"open-vm-tools-desktop-12.3.0-4.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:open-vm-tools-desktop-12.3.0-4.59.1.x86_64"},"product_reference":"open-vm-tools-desktop-12.3.0-4.59.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"open-vm-tools-salt-minion-12.3.0-4.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:open-vm-tools-salt-minion-12.3.0-4.59.1.x86_64"},"product_reference":"open-vm-tools-salt-minion-12.3.0-4.59.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"open-vm-tools-sdmp-12.3.0-4.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:open-vm-tools-sdmp-12.3.0-4.59.1.x86_64"},"product_reference":"open-vm-tools-sdmp-12.3.0-4.59.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"}]},"vulnerabilities":[{"cve":"CVE-2023-20900","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-20900"}],"notes":[{"category":"general","text":"A malicious actor that has been granted  Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html   in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged  Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP5:libvmtools0-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server 12 SP5:open-vm-tools-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server 12 SP5:open-vm-tools-desktop-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server 12 SP5:open-vm-tools-salt-minion-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server 12 SP5:open-vm-tools-sdmp-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvmtools0-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:open-vm-tools-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:open-vm-tools-desktop-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:open-vm-tools-salt-minion-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:open-vm-tools-sdmp-12.3.0-4.59.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-20900","url":"https://www.suse.com/security/cve/CVE-2023-20900"},{"category":"external","summary":"SUSE Bug 1214566 for CVE-2023-20900","url":"https://bugzilla.suse.com/1214566"},{"category":"external","summary":"SUSE Bug 1216432 for CVE-2023-20900","url":"https://bugzilla.suse.com/1216432"},{"category":"external","summary":"SUSE Bug 1216433 for CVE-2023-20900","url":"https://bugzilla.suse.com/1216433"},{"category":"external","summary":"SUSE Bug 1225628 for CVE-2023-20900","url":"https://bugzilla.suse.com/1225628"},{"category":"external","summary":"SUSE Bug 1228309 for CVE-2023-20900","url":"https://bugzilla.suse.com/1228309"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP5:libvmtools0-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server 12 SP5:open-vm-tools-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server 12 SP5:open-vm-tools-desktop-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server 12 SP5:open-vm-tools-salt-minion-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server 12 SP5:open-vm-tools-sdmp-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvmtools0-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:open-vm-tools-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:open-vm-tools-desktop-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:open-vm-tools-salt-minion-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:open-vm-tools-sdmp-12.3.0-4.59.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 12 SP5:libvmtools0-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server 12 SP5:open-vm-tools-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server 12 SP5:open-vm-tools-desktop-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server 12 SP5:open-vm-tools-salt-minion-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server 12 SP5:open-vm-tools-sdmp-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvmtools0-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:open-vm-tools-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:open-vm-tools-desktop-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:open-vm-tools-salt-minion-12.3.0-4.59.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:open-vm-tools-sdmp-12.3.0-4.59.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-09-26T16:06:28Z","details":"important"}],"title":"CVE-2023-20900"}]}