{"affected":[{"ecosystem_specific":{"binaries":[{"libvmtools0":"12.3.0-4.62.1","open-vm-tools":"12.3.0-4.62.1","open-vm-tools-desktop":"12.3.0-4.62.1","open-vm-tools-salt-minion":"12.3.0-4.62.1","open-vm-tools-sdmp":"12.3.0-4.62.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"open-vm-tools","purl":"pkg:rpm/suse/open-vm-tools&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12.3.0-4.62.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libvmtools0":"12.3.0-4.62.1","open-vm-tools":"12.3.0-4.62.1","open-vm-tools-desktop":"12.3.0-4.62.1","open-vm-tools-salt-minion":"12.3.0-4.62.1","open-vm-tools-sdmp":"12.3.0-4.62.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"open-vm-tools","purl":"pkg:rpm/suse/open-vm-tools&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12.3.0-4.62.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for open-vm-tools fixes the following issues:\n\n- CVE-2023-34058: Fixed a SAML token signature bypass issue\n  (bsc#1216432).\n- CVE-2023-34059: Fixed a privilege escalation issue through\n  vmware-user-suid-wrapper (bsc#1216433).\n","id":"SUSE-SU-2023:4228-1","modified":"2023-10-27T09:27:08Z","published":"2023-10-27T09:27:08Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20234228-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205927"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216432"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216433"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-34058"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-34059"}],"related":["CVE-2023-34058","CVE-2023-34059"],"summary":"Security update for open-vm-tools","upstream":["CVE-2023-34058","CVE-2023-34059"]}