rpm-ostree-2025.5-1.el9
エラータID: AXSA:2025-10337:01
The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks.
Security Fix(es):
* rust-openssl: rust openssl ssl::select_next_proto use after free (CVE-2025-24898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the MIRACLE LINUX 9 Release Notes linked from the References section.
CVE-2025-24898
rust-openssl is a set of OpenSSL bindings for the Rust programming language. In affected versions `ssl::select_next_proto` can return a slice pointing into the `server` argument's buffer but with a lifetime bound to the `client` argument. In situations where the `sever` buffer's lifetime is shorter than the `client` buffer's, this can cause a use after free. This could cause the server to crash or to return arbitrary memory contents to the client. The crate`openssl` version 0.10.70 fixes the signature of `ssl::select_next_proto` to properly constrain the output buffer's lifetime to that of both input buffers. Users are advised to upgrade. In standard usage of `ssl::select_next_proto` in the callback passed to `SslContextBuilder::set_alpn_select_callback`, code is only affected if the `server` buffer is constructed *within* the callback.
Update packages.
rust-openssl is a set of OpenSSL bindings for the Rust programming language. In affected versions `ssl::select_next_proto` can return a slice pointing into the `server` argument's buffer but with a lifetime bound to the `client` argument. In situations where the `sever` buffer's lifetime is shorter than the `client` buffer's, this can cause a use after free. This could cause the server to crash or to return arbitrary memory contents to the client. The crate`openssl` version 0.10.70 fixes the signature of `ssl::select_next_proto` to properly constrain the output buffer's lifetime to that of both input buffers. Users are advised to upgrade. In standard usage of `ssl::select_next_proto` in the callback passed to `SslContextBuilder::set_alpn_select_callback`, code is only affected if the `server` buffer is constructed *within* the callback.
N/A
SRPMS
- rpm-ostree-2025.5-1.el9.src.rpm
MD5: 56aa66de53d5727929602bd22ca3cde7
SHA-256: 2852bd4b7cc6edbe74e48279bcce88799cd93b6ac1fcf9ce22a0148d7ab7acd5
Size: 22.45 MB
Asianux Server 9 for x86_64
- rpm-ostree-2025.5-1.el9.x86_64.rpm
MD5: e3a4e9ca87f976bbfefbf8347fd9e561
SHA-256: dd44b793bb4a2973bc4cb353f2385e2f5e20cf09decba5f933b065ee98435426
Size: 4.40 MB - rpm-ostree-libs-2025.5-1.el9.i686.rpm
MD5: a123bbc44a19fd8f4f7fe6a556b46801
SHA-256: 7be3fb3523eec8faa1fb6f579921c9204e35dc9e8a381ee6086d75de7a81e132
Size: 23.11 kB - rpm-ostree-libs-2025.5-1.el9.x86_64.rpm
MD5: 3cbb3152de16e595a314bd6e129cd24c
SHA-256: 875ab67786085547e14ec04c3a45c7206120d450bd5b97a5e469f201c83a03ef
Size: 22.91 kB