<div class="container">
<h1>Security update for rust-keylime</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2026:0453-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2026-02-11T16:17:26Z</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1257908">bsc#1257908</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-14736">jsc#PED-14736</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2026-25727.html">CVE-2026-25727</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2026-25727</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.7</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2026-25727</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2026-25727</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li>
<li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.3</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves one vulnerability and contains one feature can now be installed.</p>
<h2>Description:</h2>
<p>This update for rust-keylime fixes the following issues:</p>
<p>Update to version 0.2.8+116.</p>
<p>Security issues fixed:</p>
<ul>
<li>CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion
(bsc#1257908).</li>
</ul>
<p>Other updates and bugfixes:</p>
<ul>
<li>
<p>Update vendored crates <code>time</code> to version 0.3.47.</p>
</li>
<li>
<p>Update to version 0.2.8+116:</p>
</li>
<li>
<p>build(deps): bump bytes from 1.7.2 to 1.11.1</p>
</li>
<li>api: Modify /version endpoint output in version 2.5</li>
<li>Add API v2.5 with backward-compatible /v2.5/quotes/integrity</li>
<li>tests: add unit test for resolve_agent_id (#1182)</li>
<li>(pull-model): enable retry logic for registration</li>
<li>rpm: Update specfiles to apply on master</li>
<li>workflows: Add test to detect unused crates</li>
<li>lib: Drop unused crates</li>
<li>push-model: Drop unused crates</li>
<li>keylime-agent: Drop unused crates</li>
<li>build(deps): bump uuid from 1.18.1 to 1.19.0</li>
<li>Update reqwest-retry to 0.8, retry-policies to 0.5</li>
<li>rpm: Fix cargo_build macro usage on CentOS Stream</li>
<li>fix(push-model): resolve hash_ek uuid to actual EK hash</li>
<li>build(deps): bump thiserror from 2.0.16 to 2.0.17</li>
<li>workflows: Separate upstream test suite from e2e coverage</li>
<li>Send UEFI measured boot logs as raw bytes (#1173)</li>
<li>auth: Add unit tests for SecretToken implementation</li>
<li>packit: Enable push-attestation tests</li>
<li>
<p>resilient_client: Prevent authentication token leakage in logs</p>
</li>
<li>
<p>Use tmpfiles.d for /var directories (PED-14736)</p>
</li>
<li>
<p>Update to version 0.2.8+96:</p>
</li>
<li>
<p>build(deps): bump wiremock from 0.6.4 to 0.6.5</p>
</li>
<li>build(deps): bump actions/checkout from 5 to 6</li>
<li>build(deps): bump chrono from 0.4.41 to 0.4.42</li>
<li>packit: Get coverage from Fedora 43 runs</li>
<li>Fix issues pointed out by clippy</li>
<li>Replace mutex unwraps with proper error handling in TPM library</li>
<li>Remove unused session request methods from StructureFiller</li>
<li>Fix config panic on missing ek_handle in push model agent</li>
<li>build(deps): bump tempfile from 3.21.0 to 3.23.0</li>
<li>build(deps): bump actions/upload-artifact from 4 to 6 (#1163)</li>
<li>Fix clippy warnings project-wide</li>
<li>Add KEYLIME_DIR support for verifier TLS certificates in push model agent</li>
<li>Thread privileged resources and use MeasurementList for IMA reading</li>
<li>Add privileged resource initialization and privilege dropping to push model agent</li>
<li>Fix privilege dropping order in run_as()</li>
<li>add documentation on FQDN hostnames</li>
<li>Remove confusing logs for push mode agent</li>
<li>Set correct default Verifier port (8891->8881) (#1159)</li>
<li>Add verifier_url to reference configuration file (#1158)</li>
<li>Add TLS support for Registrar communication (#1139)</li>
<li>Fix agent handling of 403 registration responses (#1154)</li>
<li>Add minor README.md rephrasing (#1151)</li>
<li>build(deps): bump actions/checkout from 5 to 6 (#1153)</li>
<li>ci: update spec files for packit COPR build</li>
<li>docs: improve challenge encoding and async TPM documentation</li>
<li>refactor: improve middleware and error handling</li>
<li>feat: add authentication client with middleware integration</li>
<li>docker: Include keylime_push_model_agent binary</li>
<li>Include attestation_interval configuration (#1146)</li>
<li>Persist payload keys to avoid attestation failure on restart</li>
<li>crypto: Implement the load or generate pattern for keys</li>
<li>Use simple algorithm specifiers in certification_keys object (#1140)</li>
<li>tests: Enable more tests in CI</li>
<li>Fix RSA2048 algorithm reporting in keylime agent</li>
<li>Remove disabled_signing_algorithms configuration</li>
<li>rpm: Fix metadata patches to apply to current code</li>
<li>workflows/rpm.yml: Use more strict patching</li>
<li>build(deps): bump uuid from 1.17.0 to 1.18.1</li>
<li>Fix ECC algorithm selection and reporting for keylime agent</li>
<li>Improve logging consistency and coherency</li>
<li>Implement minimal RFC compliance for Location header and URI parsing (#1125)</li>
<li>Use separate keys for payload mechanism and mTLS</li>
<li>docker: update rust to 1.81 for distroless Dockerfile</li>
<li>Ensure UEFI log capabilities are set to false</li>
<li>build(deps): bump http from 1.1.0 to 1.3.1</li>
<li>build(deps): bump log from 0.4.27 to 0.4.28</li>
<li>build(deps): bump cfg-if from 1.0.1 to 1.0.3</li>
<li>build(deps): bump actix-rt from 2.10.0 to 2.11.0</li>
<li>build(deps): bump async-trait from 0.1.88 to 0.1.89</li>
<li>build(deps): bump trybuild from 1.0.105 to 1.0.110</li>
<li>Accept evidence handling structures null entries</li>
<li>workflows: Add test to check if RPM patches still apply</li>
<li>CI: Enable test add-agent-with-malformed-ek-cert</li>
<li>config: Fix singleton tests</li>
<li>FSM: Remove needless lifetime annotations (#1105)</li>
<li>rpm: Do not remove wiremock which is now available in Fedora</li>
<li>Use latest Fedora httpdate version (1.0.3)</li>
<li>Enhance coverage with parse_retry_after test</li>
<li>Fix issues reported by CI regarding unwrap() calls</li>
<li>Reuse max retries indicated to the ResilientClient</li>
<li>Include limit of retries to 5 for Retry-After</li>
<li>Add policy to handle Retry-After response headers</li>
<li>build(deps): bump wiremock from 0.6.3 to 0.6.4</li>
<li>build(deps): bump serde_json from 1.0.140 to 1.0.143</li>
<li>build(deps): bump pest_derive from 2.8.0 to 2.8.1</li>
<li>build(deps): bump syn from 2.0.90 to 2.0.106</li>
<li>build(deps): bump tempfile from 3.20.0 to 3.21.0</li>
<li>build(deps): bump thiserror from 2.0.12 to 2.0.16</li>
<li>rpm: Fix patches to apply to current master code</li>
<li>build(deps): bump anyhow from 1.0.98 to 1.0.99</li>
<li>state_machine: Automatically clean config override during tests</li>
<li>config: Implement singleton and factory pattern</li>
<li>testing: Support overriding configuration during tests</li>
<li>feat: implement standalone challenge-response authentication module</li>
<li>structures: rename session structs for clarity and fix typos</li>
<li>tpm: refactor certify_credential_with_iak() into a more generic function</li>
<li>Add Push Model Agent Mermaid FSM chart (#1095)</li>
<li>Add state to avoid exiting on wrong attestation (#1093)</li>
<li>Add 6 alphanumeric lowercase X-Request-ID header</li>
<li>Enhance Evidence Handling response parsing</li>
<li>build(deps): bump quote from 1.0.35 to 1.0.40</li>
<li>build(deps): bump libc from 0.2.172 to 0.2.175</li>
<li>build(deps): bump glob from 0.3.2 to 0.3.3</li>
<li>build(deps): bump actix-web from 4.10.2 to 4.11.0</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
SUSE Linux Enterprise Micro for Rancher 5.3
<br/>
<code>zypper in -t patch SUSE-SLE-Micro-5.3-2026-453=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Micro 5.3
<br/>
<code>zypper in -t patch SUSE-SLE-Micro-5.3-2026-453=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
<ul>
<li>rust-keylime-0.2.8+116-150400.3.13.1</li>
<li>rust-keylime-debuginfo-0.2.8+116-150400.3.13.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
<ul>
<li>rust-keylime-0.2.8+116-150400.3.13.1</li>
<li>rust-keylime-debuginfo-0.2.8+116-150400.3.13.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2026-25727.html">https://www.suse.com/security/cve/CVE-2026-25727.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1257908">https://bugzilla.suse.com/show_bug.cgi?id=1257908</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-14736">https://jira.suse.com/browse/PED-14736</a>
</li>
</ul>
</div>