vulnerability
SUSE: CVE-2025-1057: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:N/A:P) | Dec 15, 2025 | Dec 15, 2025 | Dec 16, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
Dec 15, 2025
Added
Dec 15, 2025
Modified
Dec 16, 2025
Description
A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail.
Solutions
suse-upgrade-keylime-configsuse-upgrade-keylime-firewalldsuse-upgrade-keylime-logrotatesuse-upgrade-keylime-registrarsuse-upgrade-keylime-tenantsuse-upgrade-keylime-tpm_cert_storesuse-upgrade-keylime-verifiersuse-upgrade-python313-keylime
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.