vulnerability

SUSE: CVE-2025-1057: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
Dec 15, 2025
Added
Dec 15, 2025
Modified
Dec 16, 2025

Description

A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail.

Solutions

suse-upgrade-keylime-configsuse-upgrade-keylime-firewalldsuse-upgrade-keylime-logrotatesuse-upgrade-keylime-registrarsuse-upgrade-keylime-tenantsuse-upgrade-keylime-tpm_cert_storesuse-upgrade-keylime-verifiersuse-upgrade-python313-keylime
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.