osbuild-composer-149-4.el9_7.ML.1

エラータID: AXSA:2026-302:04

リリース日: 
2026/03/13 Friday - 18:27
題名: 
osbuild-composer-149-4.el9_7.ML.1
影響のあるチャネル: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients.

Security Fix(es):

* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2025-61726
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
CVE-2025-61728
archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.
CVE-2025-61729
Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
CVE-2025-68121
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

解決策: 

Update packages.

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. osbuild-composer-149-4.el9_7.ML.1.src.rpm
    MD5: 5e422c0d937438134593894c47a71258
    SHA-256: 55f790ba9ad0b6d4136c0d9472fb340d66e8914083d9021bbf4bbb7fddfd1a57
    Size: 22.79 MB

Asianux Server 9 for x86_64
  1. osbuild-composer-149-4.el9_7.ML.1.x86_64.rpm
    MD5: 2d0f5da5a3a2ebba5e9e1ca1525fd087
    SHA-256: 92b94b233a54c04b8337eebd959482a425d4a4b51157d11b064d1c2a31ac54ee
    Size: 21.63 kB
  2. osbuild-composer-core-149-4.el9_7.ML.1.x86_64.rpm
    MD5: 282836de5c4597fcde593702eb21f75b
    SHA-256: 103a03a0bce818d1327c0802fd8a71d03ebea775fb4231d5843dbd56aa58b101
    Size: 14.83 MB
  3. osbuild-composer-worker-149-4.el9_7.ML.1.x86_64.rpm
    MD5: da3b884303104ccc8e1597c475555ee9
    SHA-256: 8932e7f7eba38e3e3f0f12586431bf2b03086829df94a2bded8c90d479332c5d
    Size: 24.71 MB