<div class="container">
    <h1>Security update for rust-keylime</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2025:20717-1</td>
        </tr>
        <tr>
            <th>Release Date:</th>
            <td>2025-09-16T07:49:07Z</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>moderate</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1242623">bsc#1242623</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1247193">bsc#1247193</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1248006">bsc#1248006</a>
                        </li>
                    
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-58266.html">CVE-2024-58266</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-3416.html">CVE-2025-3416</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-55159.html">CVE-2025-55159</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-58266</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">2.0</span>
                                <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-58266</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-58266</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-58266</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-3416</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-3416</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-3416</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-55159</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.8</span>
                                <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-55159</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-55159</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.1</span>
                                <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">SUSE Linux Micro 6.0</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves three vulnerabilities can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update for rust-keylime fixes the following issues:</p>
<ul>
<li>Update vendored crate slab to version 0.4.11</li>
<li>
<p>CVE-2025-55159: Fixed incorrect bounds check in get_disjoint_mut function 
    leading to undefined behavior or potential crash due to out-of-bounds 
    access (bsc#1248006)</p>
</li>
<li>
<p>Update to version 0.2.8+12:</p>
</li>
<li>build(deps): bump actions/checkout from 4 to 5</li>
<li>build(deps): bump cfg-if from 1.0.0 to 1.0.1</li>
<li>build(deps): bump openssl from 0.10.72 to 0.10.73</li>
<li>build(deps): bump clap from 4.5.39 to 4.5.45</li>
<li>build(deps): bump pest from 2.8.0 to 2.8.1</li>
<li>Fix clippy warnings</li>
<li>Use verifier-provided interval for continuous attestation timing</li>
<li>Add meta object with seconds_to_next_attestation to evidence response</li>
<li>Fix boot time retrieval</li>
<li>Fix IMA log format (it must be [&#x27;text/plain&#x27;]) (#1073)</li>
<li>Remove unnecessary configuration fields</li>
<li>
<p>cargo: Bump retry-policies to version 0.4.0</p>
</li>
<li>
<p>Update vendored crate shlex to version 1.3.0</p>
</li>
<li>
<p>CVE-2024-58266: Fixed command injection (bsc#1247193) </p>
</li>
<li>
<p>Update to version 0.2.7+141:</p>
</li>
<li>service: Use WantedBy=multi-user.target</li>
<li>rpm: Add subpackage for push-attestation agent</li>
<li>push-model: implement continuous attestation with configurable intervals</li>
<li>Retry registration forever in the state machine</li>
<li>Add Verifier URL to configuration</li>
<li>Align exp.backoff to current configuration format</li>
<li>Increase coverage of state machine (using Context)</li>
<li>Increase coverage of struct_filler.rs</li>
<li>Groom code (remove dead code)</li>
<li>Fix exponential backoff (10secs, 4xx accepted)</li>
<li>test: Add documentation test to tests/run.sh</li>
<li>tpm: Avoid running code example during documentation tests</li>
<li>state_machine: Always start the agent from the Unregistered state</li>
<li>Add fixes for the URL construction</li>
<li>Refactor evidences collection in push attestation agent</li>
<li>push-model: refactor attestation logic into a state machine</li>
<li>Fix body sending by allowing serializing strings (#1057)</li>
<li>Log ResilientClient errors/response status codes (#1055)</li>
<li>Add AK signing scheme and hash algorithm to negotiation</li>
<li>tpm: Add method to extract signing scheme and hash algorithm from AK</li>
<li>Allow custom content-type/accept headers</li>
<li>Integrate exponential backoff to registration (#1052)</li>
<li>keylime/structures: Rename ShaValues to PcrBanks</li>
<li>
<p>Add resilient_client for exponential backoff (#1048)</p>
</li>
<li>
<p>Update vendored crate openssl 0.10.73:</p>
</li>
<li>
<p>CVE-2025-3416: Fixed Use-After-Free in Md::fetch and Cipher::fetch (bsc#1242623) </p>
</li>
<li>
<p>Update to version 0.2.7+117:</p>
</li>
<li>Increase coverage in evidence handling structure</li>
<li>Add Capabilities Negotiations resp. missing fields</li>
<li>Fix UEFI test to check file access in all cases</li>
<li>context_info_handler: Do not assume /var/lib/keylime exists</li>
<li>Fix clippy warnings about uninlined format arguments</li>
<li>attestation: Allow unwrap() in tests</li>
<li>Increase coverage (groom code, extend unit tests)</li>
<li>Include IMA/UEFI logs in Evidence Handling request</li>
<li>Include method to get all IMA entries as string</li>
<li>Send correct list of pcr banks and sign algorithms</li>
<li>Try to fix TPM tests related issues</li>
<li>Define attestation perform asynchronous</li>
<li>Perform attestation in push model agent binary</li>
<li>Refactor code to use new attestation.rs</li>
<li>Create attestation.rs for Attestation stuff</li>
<li>Move ContextInfo management to its own handler</li>
<li>Adjust context_info.rs after rebase</li>
<li>Add attestation function to ContextInfo structure</li>
<li>Add prohibited signing algorithms, avoid ecschnorr</li>
<li>keylime/config: Use macro to implement PushModelConfigTrait</li>
<li>Introduce keylime-macros and define_view_trait</li>
<li>config: Remove KeylimeConfig structure</li>
<li>config: Remove unnecessary options and lazy initialization</li>
<li>Fix pcr_bank function to send all possible slots</li>
<li>Send Content-Type:application/json on request (#1039)</li>
<li>Send correct &#x27;key_algorithm&#x27; in certification_keys (#1035)</li>
<li>Push Model: Persist Attestation Key to file</li>
<li>Add Keylime push model binary to root GNUmakefile</li>
<li>Use singleton to avoid multiple Context allocation</li>
<li>tests: Do not assume <code>/var/lib/keylime</code> exists (#1030)</li>
<li>lib/cert: Fix race condition due to use of same file path</li>
<li>payloads: Fix race condition in tests</li>
<li>Add uefi_log_handler.rs to parse UEFI binary</li>
<li>Use IMA log parser to send correct entry count</li>
<li>Add IMA log parser</li>
<li>build(deps): bump once_cell from 1.19.0 to 1.21.3</li>
<li>lib/config/base.rs: Add more unit tests</li>
<li>lib/permissions: Add unit tests</li>
<li>keylime-agent: move JsonWrapper from common.rs to the library</li>
<li>lib/agent_data: Move agent_data related tests from common</li>
<li>common: Replace APIVersion with the library Version structure</li>
<li>keylime_agent: Move secure_mount.rs to the library</li>
<li>lib: Rename keylime_error.rs as error.rs</li>
<li>config: Move config to keylime library</li>
<li>config: Rename push_model_config to push_model</li>
<li>lib: Move permissions.rs from keylime-agent to the lib</li>
<li>Extract Capabilities Negotiation info from TPM (#1014)</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Linux Micro 6.0
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-6.0-461=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Linux Micro 6.0 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>rust-keylime-debuginfo-0.2.8+12-1.1</li>
                        
                            <li>rust-keylime-0.2.8+12-1.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-58266.html">https://www.suse.com/security/cve/CVE-2024-58266.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-3416.html">https://www.suse.com/security/cve/CVE-2025-3416.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-55159.html">https://www.suse.com/security/cve/CVE-2025-55159.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1242623">https://bugzilla.suse.com/show_bug.cgi?id=1242623</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1247193">https://bugzilla.suse.com/show_bug.cgi?id=1247193</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1248006">https://bugzilla.suse.com/show_bug.cgi?id=1248006</a>
                    </li>
                
            
        </ul>
    
</div>