Описание
Security update for snpguest
This update for snpguest fixes the following issues:
Update to version 0.10.0.
Security issues fixed:
- CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion (bsc#1257927).
- CVE-2025-3416: openssl: Use-After-Free in Md::fetch and Cipher::fetch in rust-openssl crate (bsc#1242601).
- CVE-2024-12224: idna: idna accepts Punycode labels that do not produce any non-ASCII when decoded (bcs#1243869).
Other updates and bugfixes:
-
Update to version 0.10.0
- fails to generate attestation reports on SEV-SNP guests with firmware API (bsc#1257877).
- chore: updating tool version to 0.10.0
- refactor(certs): remove redundant branch in file-write logic
- Docs: Adding verify measure, host-data, report-data to docs
- verify: verify measurent, host data, and report data attributes from the attestation report.
- library: Updating sev library to 7.1.0
- ci: replace deprecated gh actions
- feat: multi-format integer parsing for key subcommand arguments
- chore(main): remove unused import
clap::arg - feat(fetch): add fetch crl subcommand
- .github/lint: Bump toolchain version to 1.86
- Bump rust version to 1.86
- feat: bumping tool to version 0.9.2
- fix(verify): silence mismatched_lifetime_syntaxes in SnpOid::oid
- feat: support SEV-SNP ABI Spec 1.58 (bump sev to v6.3.0)
- docs: restore and clarify Global Options section
- doc: fix CL argument orders + address recent changes
- fix(hyperv): downgrade VMPL check from error to warning
- fix(report.rs): remove conflict check between --random flag and Hyper-V
- fix(report.rs): Decouple runtime behavior from hyperv build feature
- refactor: clarify --platform error message
- docs: add Azure/Hyper-V build note for --platform
- report: Writing Req Data as Binary (#101)
- deps: bump virtee/sev to 6.2.1 (fix TCB-serialization bug) (#99)
- Updating SEV library to 6.1.0 and updating version to 0.9.1
- Update version (0.9.0)
- HyperV: Fixing report command failure on Azure confidential VM
- Removing intird and append requirement for kernel measurements (#93)
- Updating to version 6 of library and fixing attestation (#89)
- CI: Fixing create_release workflow (#91)
- Minor update (0.8.3)
- Adding build script
- Update preattestation.rs
- Fix certificate fetch bug for Turin
- Minor update
- Update bitfield to 0.15.0
- Update to 0.8.1
- Update asn1-rs and x509-parser
- Update to 0.8.0
- key: Fix guest_field_select typo
- Adding Turin support and updating ASK cn
Список пакетов
Container suse/multi-linux-manager/5.1/x86_64/server-attestation:latest
SUSE Linux Enterprise Module for Server Applications 15 SP7
Ссылки
- Link for SUSE-SU-2026:0620-1
- E-Mail link for SUSE-SU-2026:0620-1
- SUSE Security Ratings
- SUSE Bug 1242601
- SUSE Bug 1243869
- SUSE Bug 1257877
- SUSE Bug 1257927
- SUSE CVE CVE-2024-12224 page
- SUSE CVE CVE-2025-3416 page
- SUSE CVE CVE-2026-25727 page
Описание
Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname.
Затронутые продукты
Ссылки
- CVE-2024-12224
- SUSE Bug 1243848
Описание
A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.
Затронутые продукты
Ссылки
- CVE-2025-3416
- SUSE Bug 1242599
Описание
time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.
Затронутые продукты
Ссылки
- CVE-2026-25727
- SUSE Bug 1257901