Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2026:0620-1

Опубликовано: 24 фев. 2026
Источник: suse-cvrf

Описание

Security update for snpguest

This update for snpguest fixes the following issues:

Update to version 0.10.0.

Security issues fixed:

  • CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion (bsc#1257927).
  • CVE-2025-3416: openssl: Use-After-Free in Md::fetch and Cipher::fetch in rust-openssl crate (bsc#1242601).
  • CVE-2024-12224: idna: idna accepts Punycode labels that do not produce any non-ASCII when decoded (bcs#1243869).

Other updates and bugfixes:

  • Update to version 0.10.0

    • fails to generate attestation reports on SEV-SNP guests with firmware API (bsc#1257877).
    • chore: updating tool version to 0.10.0
    • refactor(certs): remove redundant branch in file-write logic
    • Docs: Adding verify measure, host-data, report-data to docs
    • verify: verify measurent, host data, and report data attributes from the attestation report.
    • library: Updating sev library to 7.1.0
    • ci: replace deprecated gh actions
    • feat: multi-format integer parsing for key subcommand arguments
    • chore(main): remove unused import clap::arg
    • feat(fetch): add fetch crl subcommand
    • .github/lint: Bump toolchain version to 1.86
    • Bump rust version to 1.86
    • feat: bumping tool to version 0.9.2
    • fix(verify): silence mismatched_lifetime_syntaxes in SnpOid::oid
    • feat: support SEV-SNP ABI Spec 1.58 (bump sev to v6.3.0)
    • docs: restore and clarify Global Options section
    • doc: fix CL argument orders + address recent changes
    • fix(hyperv): downgrade VMPL check from error to warning
    • fix(report.rs): remove conflict check between --random flag and Hyper-V
    • fix(report.rs): Decouple runtime behavior from hyperv build feature
    • refactor: clarify --platform error message
    • docs: add Azure/Hyper-V build note for --platform
    • report: Writing Req Data as Binary (#101)
    • deps: bump virtee/sev to 6.2.1 (fix TCB-serialization bug) (#99)
    • Updating SEV library to 6.1.0 and updating version to 0.9.1
    • Update version (0.9.0)
    • HyperV: Fixing report command failure on Azure confidential VM
    • Removing intird and append requirement for kernel measurements (#93)
    • Updating to version 6 of library and fixing attestation (#89)
    • CI: Fixing create_release workflow (#91)
    • Minor update (0.8.3)
    • Adding build script
    • Update preattestation.rs
    • Fix certificate fetch bug for Turin
    • Minor update
    • Update bitfield to 0.15.0
    • Update to 0.8.1
    • Update asn1-rs and x509-parser
    • Update to 0.8.0
    • key: Fix guest_field_select typo
    • Adding Turin support and updating ASK cn

Список пакетов

Container suse/multi-linux-manager/5.1/x86_64/server-attestation:latest
snpguest-0.10.0-150700.3.3.1
SUSE Linux Enterprise Module for Server Applications 15 SP7
snpguest-0.10.0-150700.3.3.1

Описание

Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname.


Затронутые продукты
Container suse/multi-linux-manager/5.1/x86_64/server-attestation:latest:snpguest-0.10.0-150700.3.3.1
SUSE Linux Enterprise Module for Server Applications 15 SP7:snpguest-0.10.0-150700.3.3.1

Ссылки

Описание

A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.


Затронутые продукты
Container suse/multi-linux-manager/5.1/x86_64/server-attestation:latest:snpguest-0.10.0-150700.3.3.1
SUSE Linux Enterprise Module for Server Applications 15 SP7:snpguest-0.10.0-150700.3.3.1

Ссылки

Описание

time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.


Затронутые продукты
Container suse/multi-linux-manager/5.1/x86_64/server-attestation:latest:snpguest-0.10.0-150700.3.3.1
SUSE Linux Enterprise Module for Server Applications 15 SP7:snpguest-0.10.0-150700.3.3.1

Ссылки
Уязвимость SUSE-SU-2026:0620-1