<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Recommended update of flake-pilot</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:20013-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-10-15T12:01:21Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-10-15T12:01:21Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-10-15T12:01:21Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Recommended update of flake-pilot</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for flake-pilot fixes the following issues:

Update version to 3.1.22.

- Fixes to use flakes as normal user

  Running a flake is a container based instance provisioning
  and startup. Some part of this process requires root permissions
  for example mounting the container instance store for the
  provisioning step. This commit fixes the required calls to
  be properly managed by sudo.

- seed from entropy

- Fix assignment of random sequence number

  We should use a seed for the sequence as described in
  https://rust-random.github.io/book/guide-seeding.html#a-simple-number
  In addition the logic when a random sequence number should
  be used was wrong and needed a fix regarding resume and
  attach type flakes which must not use a random sequence

- Pass --init option for resume type flakes

  In resume mode a sleep command is used to keep the container
  open. However, without the --init option there is no signal
  handling available. This commit fixes it

- Revert "kill prior remove when using %remove flag"

  This reverts commit 06c7d4aa71f74865dfecba399fd08cc2fde2e1f2.
  no hard killing needed with the event loop entrypoint

- Fixed CVE-2025-55159 slab: incorrect bounds check

  Update to slab 0.4.11 to fix the mentioned CVE.
  This Fixes bsc#1248004

- Apply clippy fixes

- Create sequence number for the same invocation

  If a flake which is not a resume or attach flake is called twice
  with the same invocation arguments an error message is displayed
  to give this invocation a new name via the @NAME runtime option.
  This commit makes this more comfortable and automatically assigns
  a random sequence number for the call if no @NAME is given.

- kill prior remove when using %remove flag

  In case the container instance should be removed via the %remove
  flag, send a kill first, followed by a force remove. The reason
  for this is because we use a never ending sleep command as entry
  point for resume type containers. If they should be removed the
  standard signal send on podman rm will not stop the sleep and
  after a period of 10 seconds podman sends a kill signal itself.
  We can speedup this process as we know the entry point command
  and send the kill signal first followed by the remove which
  saves us some wait time spent in podman otherwise.

- Fix clippy hints

  variables can be used directly in the format! string

- Prune old images after load

  Make sure no &lt;none&gt; image references stay in the registry

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Leap-16.0-2</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248004</URL>
      <Description>SUSE Bug 1248004</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-55159/</URL>
      <Description>SUSE CVE CVE-2025-55159 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 16.0">
      <Branch Type="Product Name" Name="openSUSE Leap 16.0">
        <FullProductName ProductID="openSUSE Leap 16.0">openSUSE Leap 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="flake-pilot-3.1.22-160000.1.1">
      <FullProductName ProductID="flake-pilot-3.1.22-160000.1.1">flake-pilot-3.1.22-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="flake-pilot-firecracker-3.1.22-160000.1.1">
      <FullProductName ProductID="flake-pilot-firecracker-3.1.22-160000.1.1">flake-pilot-firecracker-3.1.22-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1">
      <FullProductName ProductID="flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1">flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1">
      <FullProductName ProductID="flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1">flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="flake-pilot-podman-3.1.22-160000.1.1">
      <FullProductName ProductID="flake-pilot-podman-3.1.22-160000.1.1">flake-pilot-podman-3.1.22-160000.1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="flake-pilot-3.1.22-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1">flake-pilot-3.1.22-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="flake-pilot-firecracker-3.1.22-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1">flake-pilot-firecracker-3.1.22-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1">flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1">flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="flake-pilot-podman-3.1.22-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1">flake-pilot-podman-3.1.22-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab's capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab's actual length.</Note>
    </Notes>
    <CVE>CVE-2025-55159</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-55159.html</URL>
        <Description>CVE-2025-55159</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248000</URL>
        <Description>SUSE Bug 1248000</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
