runc-1.4.0-2.el9_7

エラータID: AXSA:2026-237:01

リリース日: 
2026/02/27 Friday - 18:10
題名: 
runc-1.4.0-2.el9_7
影響のあるチャネル: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.

Security Fix(es):

* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2025-61726
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
CVE-2025-61729
Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
CVE-2025-68121
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

解決策: 

Update packages.

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. runc-1.4.0-2.el9_7.src.rpm
    MD5: 5e0e255f6d67597ab771552b77a90073
    SHA-256: 197f86b83db453f011e69b718447589fe250f48e4c0cc039627597e2b88923ab
    Size: 2.79 MB

Asianux Server 9 for x86_64
  1. runc-1.4.0-2.el9_7.x86_64.rpm
    MD5: c75c2a6833d76a51c4768e0a8b3795fb
    SHA-256: 26f5b5d18b84d3e23123065306898870e41851d9248b328a8153362939ae73c5
    Size: 3.97 MB