<div class="container">
    <h1>Security update for rust-keylime</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2026:0452-1</td>
        </tr>
        <tr>
            <th>Release Date:</th>
            <td>2026-02-11T16:17:17Z</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1257908">bsc#1257908</a>
                        </li>
                    
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-14736">jsc#PED-14736</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2026-25727.html">CVE-2026-25727</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2026-25727</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.7</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2026-25727</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2026-25727</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.8</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.4</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves one vulnerability and contains one feature can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update for rust-keylime fixes the following issues:</p>
<p>Update to version 0.2.8+116.</p>
<p>Security issues fixed:</p>
<ul>
<li>CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion
  (bsc#1257908).</li>
</ul>
<p>Other updates and bugfixes:</p>
<ul>
<li>
<p>Update vendored crates <code>time</code> to version 0.3.47.</p>
</li>
<li>
<p>Update to version 0.2.8+116:</p>
</li>
<li>
<p>build(deps): bump bytes from 1.7.2 to 1.11.1</p>
</li>
<li>api: Modify /version endpoint output in version 2.5</li>
<li>Add API v2.5 with backward-compatible /v2.5/quotes/integrity</li>
<li>tests: add unit test for resolve_agent_id (#1182)</li>
<li>(pull-model): enable retry logic for registration</li>
<li>rpm: Update specfiles to apply on master</li>
<li>workflows: Add test to detect unused crates</li>
<li>lib: Drop unused crates</li>
<li>push-model: Drop unused crates</li>
<li>keylime-agent: Drop unused crates</li>
<li>build(deps): bump uuid from 1.18.1 to 1.19.0</li>
<li>Update reqwest-retry to 0.8, retry-policies to 0.5</li>
<li>rpm: Fix cargo_build macro usage on CentOS Stream</li>
<li>fix(push-model): resolve hash_ek uuid to actual EK hash</li>
<li>build(deps): bump thiserror from 2.0.16 to 2.0.17</li>
<li>workflows: Separate upstream test suite from e2e coverage</li>
<li>Send UEFI measured boot logs as raw bytes (#1173)</li>
<li>auth: Add unit tests for SecretToken implementation</li>
<li>packit: Enable push-attestation tests</li>
<li>
<p>resilient_client: Prevent authentication token leakage in logs</p>
</li>
<li>
<p>Use tmpfiles.d for /var directories (PED-14736)</p>
</li>
<li>
<p>Update to version 0.2.8+96:</p>
</li>
<li>
<p>build(deps): bump wiremock from 0.6.4 to 0.6.5</p>
</li>
<li>build(deps): bump actions/checkout from 5 to 6</li>
<li>build(deps): bump chrono from 0.4.41 to 0.4.42</li>
<li>packit: Get coverage from Fedora 43 runs</li>
<li>Fix issues pointed out by clippy</li>
<li>Replace mutex unwraps with proper error handling in TPM library</li>
<li>Remove unused session request methods from StructureFiller</li>
<li>Fix config panic on missing ek_handle in push model agent</li>
<li>build(deps): bump tempfile from 3.21.0 to 3.23.0</li>
<li>build(deps): bump actions/upload-artifact from 4 to 6 (#1163)</li>
<li>Fix clippy warnings project-wide</li>
<li>Add KEYLIME_DIR support for verifier TLS certificates in push model agent</li>
<li>Thread privileged resources and use MeasurementList for IMA reading</li>
<li>Add privileged resource initialization and privilege dropping to push model agent</li>
<li>Fix privilege dropping order in run_as()</li>
<li>add documentation on FQDN hostnames</li>
<li>Remove confusing logs for push mode agent</li>
<li>Set correct default Verifier port (8891->8881) (#1159)</li>
<li>Add verifier_url to reference configuration file (#1158)</li>
<li>Add TLS support for Registrar communication (#1139)</li>
<li>Fix agent handling of 403 registration responses (#1154)</li>
<li>Add minor README.md rephrasing (#1151)</li>
<li>build(deps): bump actions/checkout from 5 to 6 (#1153)</li>
<li>ci: update spec files for packit COPR build</li>
<li>docs: improve challenge encoding and async TPM documentation</li>
<li>refactor: improve middleware and error handling</li>
<li>feat: add authentication client with middleware integration</li>
<li>docker: Include keylime_push_model_agent binary</li>
<li>Include attestation_interval configuration (#1146)</li>
<li>Persist payload keys to avoid attestation failure on restart</li>
<li>crypto: Implement the load or generate pattern for keys</li>
<li>Use simple algorithm specifiers in certification_keys object (#1140)</li>
<li>tests: Enable more tests in CI</li>
<li>Fix RSA2048 algorithm reporting in keylime agent</li>
<li>Remove disabled_signing_algorithms configuration</li>
<li>rpm: Fix metadata patches to apply to current code</li>
<li>workflows/rpm.yml: Use more strict patching</li>
<li>build(deps): bump uuid from 1.17.0 to 1.18.1</li>
<li>Fix ECC algorithm selection and reporting for keylime agent</li>
<li>Improve logging consistency and coherency</li>
<li>Implement minimal RFC compliance for Location header and URI parsing (#1125)</li>
<li>Use separate keys for payload mechanism and mTLS</li>
<li>docker: update rust to 1.81 for distroless Dockerfile</li>
<li>Ensure UEFI log capabilities are set to false</li>
<li>build(deps): bump http from 1.1.0 to 1.3.1</li>
<li>build(deps): bump log from 0.4.27 to 0.4.28</li>
<li>build(deps): bump cfg-if from 1.0.1 to 1.0.3</li>
<li>build(deps): bump actix-rt from 2.10.0 to 2.11.0</li>
<li>build(deps): bump async-trait from 0.1.88 to 0.1.89</li>
<li>build(deps): bump trybuild from 1.0.105 to 1.0.110</li>
<li>Accept evidence handling structures null entries</li>
<li>workflows: Add test to check if RPM patches still apply</li>
<li>CI: Enable test add-agent-with-malformed-ek-cert</li>
<li>config: Fix singleton tests</li>
<li>FSM: Remove needless lifetime annotations (#1105)</li>
<li>rpm: Do not remove wiremock which is now available in Fedora</li>
<li>Use latest Fedora httpdate version (1.0.3)</li>
<li>Enhance coverage with parse_retry_after test</li>
<li>Fix issues reported by CI regarding unwrap() calls</li>
<li>Reuse max retries indicated to the ResilientClient</li>
<li>Include limit of retries to 5 for Retry-After</li>
<li>Add policy to handle Retry-After response headers</li>
<li>build(deps): bump wiremock from 0.6.3 to 0.6.4</li>
<li>build(deps): bump serde_json from 1.0.140 to 1.0.143</li>
<li>build(deps): bump pest_derive from 2.8.0 to 2.8.1</li>
<li>build(deps): bump syn from 2.0.90 to 2.0.106</li>
<li>build(deps): bump tempfile from 3.20.0 to 3.21.0</li>
<li>build(deps): bump thiserror from 2.0.12 to 2.0.16</li>
<li>rpm: Fix patches to apply to current master code</li>
<li>build(deps): bump anyhow from 1.0.98 to 1.0.99</li>
<li>state_machine: Automatically clean config override during tests</li>
<li>config: Implement singleton and factory pattern</li>
<li>testing: Support overriding configuration during tests</li>
<li>feat: implement standalone challenge-response authentication module</li>
<li>structures: rename session structs for clarity and fix typos</li>
<li>tpm: refactor certify_credential_with_iak() into a more generic function</li>
<li>Add Push Model Agent Mermaid FSM chart (#1095)</li>
<li>Add state to avoid exiting on wrong attestation (#1093)</li>
<li>Add 6 alphanumeric lowercase X-Request-ID header</li>
<li>Enhance Evidence Handling response parsing</li>
<li>build(deps): bump quote from 1.0.35 to 1.0.40</li>
<li>build(deps): bump libc from 0.2.172 to 0.2.175</li>
<li>build(deps): bump glob from 0.3.2 to 0.3.3</li>
<li>build(deps): bump actix-web from 4.10.2 to 4.11.0</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro for Rancher 5.4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.4-2026-452=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro 5.4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.4-2026-452=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>rust-keylime-0.2.8+116-150400.3.11.1</li>
                        
                            <li>rust-keylime-debuginfo-0.2.8+116-150400.3.11.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>rust-keylime-0.2.8+116-150400.3.11.1</li>
                        
                            <li>rust-keylime-debuginfo-0.2.8+116-150400.3.11.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2026-25727.html">https://www.suse.com/security/cve/CVE-2026-25727.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1257908">https://bugzilla.suse.com/show_bug.cgi?id=1257908</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-14736">https://jira.suse.com/browse/PED-14736</a>
                    </li>
                
            
        </ul>
    
</div>