<div class="container">
    <h1>Security update for rust-keylime</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2025:20491-1</td>
        </tr>
        <tr>
            <th>Release Date:</th>
            <td>2025-07-11T09:49:31Z</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>moderate</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1243861">bsc#1243861</a>
                        </li>
                    
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-12224.html">CVE-2024-12224</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-12224</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">2.1</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-12224</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-12224</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.1</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">SUSE Linux Micro 6.0</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves one vulnerability can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update for rust-keylime fixes the following issues:</p>
<ul>
<li>
<p>CVE-2024-12224: idna: Fixed improper validation in punycode (bsc#1243861)</p>
</li>
<li>
<p>Update to version 0.2.7+70: </p>
</li>
<li>build(deps): bump wiremock from 0.6.2 to 0.6.3</li>
<li>build(deps): bump uuid from 1.16.0 to 1.17.0</li>
<li>lib: Introduce AgentIdentity structure</li>
<li>gitignore: Add <em>.swp and </em>.orig to be ignored</li>
<li>build(deps): bump clap from 4.5.38 to 4.5.39</li>
<li>build(deps): bump tokio from 1.45.0 to 1.45.1</li>
<li>Unify Push Model structures time formats to UTC (#1016)</li>
<li>Add Quote related structures to Keylime library</li>
<li>Remove configuration file trailing whitespaces (#1012)</li>
<li>keylime-agent.conf: add all accepted TPM encryption algs</li>
<li>tpm: add policy auth for EK to activate crendential</li>
<li>Enable non standard key sizes and curves for EK and AK</li>
<li>config: Use next_back() instead of last() for iterators</li>
<li>Update to tss-esapi v7.6.0</li>
<li>Avoid duplicated call to ctx.create_ek</li>
<li>build(deps): bump clap from 4.5.23 to 4.5.38</li>
<li>Add registration for Push Model client</li>
<li>build(deps): bump tokio from 1.44.2 to 1.45.0</li>
<li>build(deps): bump chrono from 0.4.40 to 0.4.41</li>
<li>build(deps): bump tempfile from 3.17.1 to 3.20.0</li>
<li>Refactor code: move error, registration to lib</li>
<li>Move structure filling and URL selection code (#999)</li>
<li>build(deps): bump pest_derive from 2.7.15 to 2.8.0</li>
<li>build(deps): bump pest from 2.7.15 to 2.8.0</li>
<li>build(deps): bump libc from 0.2.169 to 0.2.172</li>
<li>Add Evidence/Authentication messages to prototype</li>
<li>build(deps): bump uuid from 1.15.1 to 1.16.0</li>
<li>build(deps): bump thiserror from 2.0.11 to 2.0.12</li>
<li>build(deps): bump signal-hook from 0.3.17 to 0.3.18</li>
<li>build(deps): bump log from 0.4.25 to 0.4.27</li>
<li>build(deps): bump assert_cmd from 2.0.16 to 2.0.17</li>
<li>build(deps): bump actix-web from 4.9.0 to 4.10.2</li>
<li>build(deps): bump reqwest from 0.12.12 to 0.12.15</li>
<li>build(deps): bump serde from 1.0.217 to 1.0.219</li>
<li>Add unit tests for sessions.rs structures</li>
<li>Add auth(sessions) structures</li>
<li>Fix minor README.md issue (#988)</li>
<li>Define EvidenceHandling structures (#971)</li>
<li>Add mockoon test scenario</li>
<li>Add client certificates to push-attestation prototype</li>
<li>Cargo: bump url crate to version 2.5.4</li>
<li>Add logging to the push attestation prototype</li>
<li>Do not use certificate on insecure mode</li>
<li>common: Move the EncryptedData structure from common to the library</li>
<li>common: Move AuthTag from common to the library</li>
<li>build(deps): bump openssl from 0.10.71 to 0.10.72</li>
<li>common: Move Symmkey to library as crypto::symmkey</li>
<li>common: Remove unused constants and static values</li>
<li>build(deps): bump tokio from 1.43.0 to 1.44.2</li>
<li>Refactor code: Include AgentIdentity structure</li>
<li>Push model prototype</li>
<li>Add support for ek certificate chain, stored in TPM NVRAM.</li>
<li>Recover key_class field and set it as "asymmetric"</li>
<li>Update push model structures to latest values</li>
<li>build(deps): bump serde_json from 1.0.138 to 1.0.140</li>
<li>packit: Add identifier for each copr_build job</li>
<li>keylime-agent.conf: only mention ecdsa and rsassa for signing</li>
<li>build(deps): bump openssl from 0.10.70 to 0.10.71</li>
<li>build(deps): bump uuid from 1.13.2 to 1.15.1</li>
<li>Add capabilities_negotiation structures</li>
<li>packit: Add compatibility/api_version_compatibility test</li>
<li>build(deps): bump uuid from 1.11.0 to 1.13.2</li>
<li>build(deps): bump serde_json from 1.0.135 to 1.0.138</li>
<li>build(deps): bump thiserror from 2.0.9 to 2.0.11</li>
<li>build(deps): bump tempfile from 3.14.0 to 3.17.1</li>
<li>Allow agent to start as non-root</li>
<li>scripts: Fix coverage information downloading script</li>
<li>build(deps): bump openssl from 0.10.68 to 0.10.70</li>
<li>
<p>build(deps): bump tokio from 1.42.0 to 1.43.0</p>
</li>
<li>
<p>Update to version 0.2.7+1:</p>
</li>
<li>dist: Enable logging for keylime library in the service</li>
<li>Bump version to 0.2.7</li>
<li>scripts: Download coverage data from Testing Farm directly</li>
<li>main: Remove unnecessary lifetime</li>
<li>cargo: Bump pretty_env_logger to version 0.5.0</li>
<li>scripts: Fix regex in download_packit_coverage.sh</li>
<li>cargo: Bump clap crate to version 4.5.23</li>
<li>cargo: Bump base64 crate to version 0.22.1</li>
<li>build(deps): bump log from 0.4.22 to 0.4.25</li>
<li>build(deps): bump serde_json from 1.0.133 to 1.0.135</li>
<li>cargo: Bump tokio crate to version 1.42.0</li>
<li>packit: Fix RPM builds on copr</li>
<li>cargo: Bump thiserror crate to version 0.2.9</li>
<li>cargo: Update reqwest to version 0.12.12</li>
<li>build(deps): bump libc from 0.2.168 to 0.2.169</li>
<li>build(deps): bump glob from 0.3.1 to 0.3.2</li>
<li>version: Implement API version validation and ordering</li>
<li>main: Support using multiple API versions for registration</li>
<li>keylime: Introduce the registrar_client module</li>
<li>Provide endpoints under multiple API versions</li>
<li>Move &#x27;serialization&#x27; module to the keylime library</li>
<li>Drop unnecessary dependency on common::API_VERSION</li>
<li>keylime-agent.conf: Bump version to 2.3</li>
<li>build(deps): bump serde from 1.0.210 to 1.0.217</li>
<li>build(deps): bump pest_derive from 2.7.14 to 2.7.15</li>
<li>build(deps): bump pest from 2.7.14 to 2.7.15</li>
<li>build(deps): bump libc from 0.2.167 to 0.2.168</li>
<li>config: Make IAK and IDevID certificates optional</li>
<li>Fix warnings reported by clippy</li>
<li>workflows: Run job in the CI container directly</li>
<li>tests: Add unit test for device ID builder</li>
<li>main: Move IAK/IDevID related code to dedicated module</li>
<li>tests: Add script to generate IAK and IDevID certificates</li>
<li>build(deps): bump openssl from 0.10.66 to 0.10.68</li>
<li>build(deps): bump uuid from 1.10.0 to 1.11.0</li>
<li>build(deps): bump serde_json from 1.0.128 to 1.0.133</li>
<li>build(deps): bump actix-web from 4.5.1 to 4.9.0</li>
<li>build(deps): bump reqwest from 0.12.7 to 0.12.9</li>
<li>tests/setup_swtpm.sh: Add script to setup temporary TPM</li>
<li>Use a single TPM context and avoid race conditions during tests</li>
<li>config: Enable passing a hostname instead of IP</li>
<li>build(deps): bump clap from 4.3.11 to 4.5.21</li>
<li>build(deps): bump tempfile from 3.10.1 to 3.14.0</li>
<li>build(deps): bump pest_derive from 2.7.6 to 2.7.14</li>
<li>build(deps): bump pest from 2.7.6 to 2.7.14</li>
<li>build(deps): bump codecov/codecov-action from 4 to 5</li>
<li>workflows: Submit the coverage for merged PR from Fedora 41</li>
<li>tests: Use Fedora 41 to generate code coverage</li>
<li>api: Make API configuration modular</li>
<li>agent_handler: Move the /agent scope configuration</li>
<li>notifications_handler: Move the /notifications scope configuration</li>
<li>quotes_handler: Move the /quotes scope configuration to quotes_handler</li>
<li>keys_handler: Move /keys scope configuration to keys_handler</li>
<li>Use ${DESTDIR} for config</li>
<li>Fix showing wrong UUID</li>
<li>build(deps): bump actix-rt from 2.9.0 to 2.10.0</li>
<li>config: Refactor AgentConfig Source trait implementation</li>
<li>build(deps): bump log from 0.4.21 to 0.4.22</li>
<li>build(deps): bump serde_json from 1.0.120 to 1.0.128</li>
<li>tpm: check if EK certificate has valid ASN.1 DER encoding</li>
<li>build(deps): bump futures from 0.3.27 to 0.3.31</li>
<li>cargo: Bump reqwest to version 0.12.7</li>
<li>build(deps): bump serde from 1.0.203 to 1.0.210</li>
<li>tests: Add more tests to Packit CI</li>
<li>build(deps): bump docker/build-push-action from 5 to 6</li>
<li>tests: apply workarounds to known bugs</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Linux Micro 6.0
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-6.0-380=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Linux Micro 6.0 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>rust-keylime-debuginfo-0.2.7+70-1.1</li>
                        
                            <li>rust-keylime-0.2.7+70-1.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-12224.html">https://www.suse.com/security/cve/CVE-2024-12224.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1243861">https://bugzilla.suse.com/show_bug.cgi?id=1243861</a>
                    </li>
                
            
        </ul>
    
</div>