{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for sevctl","title":"Title of the patch"},{"category":"description","text":"This update for sevctl fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2023-50711: Fixed out of bounds memory accesses in a vendored dependency (bsc#1218502)\n\nNon-security issue fixed:\n\n- Update vendored dependencies and re-enable cargo update obs service (bsc#1229953)\n","title":"Description of the patch"},{"category":"details","text":"SUSE-SLE-Micro-6.0-136","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20071-1.json"},{"category":"self","summary":"URL for SUSE-SU-2025:20071-1","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520071-1/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2025:20071-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021299.html"},{"category":"self","summary":"SUSE Bug 1218499","url":"https://bugzilla.suse.com/1218499"},{"category":"self","summary":"SUSE Bug 1218502","url":"https://bugzilla.suse.com/1218502"},{"category":"self","summary":"SUSE Bug 1229953","url":"https://bugzilla.suse.com/1229953"},{"category":"self","summary":"SUSE CVE CVE-2023-50711 page","url":"https://www.suse.com/security/cve/CVE-2023-50711/"}],"title":"Security update for sevctl","tracking":{"current_release_date":"2025-02-03T09:03:35Z","generator":{"date":"2025-02-03T09:03:35Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2025:20071-1","initial_release_date":"2025-02-03T09:03:35Z","revision_history":[{"date":"2025-02-03T09:03:35Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"sevctl-0.4.3-2.1.x86_64","product":{"name":"sevctl-0.4.3-2.1.x86_64","product_id":"sevctl-0.4.3-2.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Linux Micro 6.0","product":{"name":"SUSE Linux Micro 6.0","product_id":"SUSE Linux Micro 6.0","product_identification_helper":{"cpe":"cpe:/o:suse:sl-micro:6.0"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"sevctl-0.4.3-2.1.x86_64 as component of SUSE Linux Micro 6.0","product_id":"SUSE Linux Micro 6.0:sevctl-0.4.3-2.1.x86_64"},"product_reference":"sevctl-0.4.3-2.1.x86_64","relates_to_product_reference":"SUSE Linux Micro 6.0"}]},"vulnerabilities":[{"cve":"CVE-2023-50711","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-50711"}],"notes":[{"category":"general","text":"vmm-sys-util is a collection of modules that provides helpers and utilities used by multiple rust-vmm components. Starting in version 0.5.0 and prior to version 0.12.0, an issue in the `FamStructWrapper::deserialize` implementation provided by the crate for `vmm_sys_util::fam::FamStructWrapper` can lead to out of bounds memory accesses. The deserialization does not check that the length stored in the header matches the flexible array length. Mismatch in the lengths might allow out of bounds memory access through Rust-safe methods. The issue was corrected in version 0.12.0 by inserting a check that verifies the lengths of compared flexible arrays are equal for any deserialized header and aborting deserialization otherwise. Moreover, the API was changed so that header length can only be modified through Rust-unsafe code. This ensures that users cannot trigger out-of-bounds memory access from Rust-safe code.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Micro 6.0:sevctl-0.4.3-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-50711","url":"https://www.suse.com/security/cve/CVE-2023-50711"},{"category":"external","summary":"SUSE Bug 1218499 for CVE-2023-50711","url":"https://bugzilla.suse.com/1218499"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Micro 6.0:sevctl-0.4.3-2.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L","version":"3.1"},"products":["SUSE Linux Micro 6.0:sevctl-0.4.3-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2025-02-03T09:03:35Z","details":"moderate"}],"title":"CVE-2023-50711"}]}