Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2026-2124

Опубликовано: 06 фев. 2026
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2026-2124: osbuild-composer security update (IMPORTANT)

[101.4-3.0.1]

  • Support using repository definitons with OCI variables [JIRA: OLDIS-38657]
  • Update repositories to contain OCI variables
  • Remove image types Minimal-raw and wsl [JIRA: OLDIS-38123]
  • Increase default /boot size to 1GB [Orabug: 36827079]
  • support for building OL8/9 images on Oracle Linux 8 [Orabug: 36400619]

[101.4-3]

  • Rebuilt to fix:
    • CVE-2025-61729
    • RHEL-140539

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

osbuild-composer

101.4-3.0.1.el8_10

osbuild-composer-core

101.4-3.0.1.el8_10

osbuild-composer-worker

101.4-3.0.1.el8_10

Oracle Linux x86_64

osbuild-composer

101.4-3.0.1.el8_10

osbuild-composer-core

101.4-3.0.1.el8_10

osbuild-composer-worker

101.4-3.0.1.el8_10

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
2 месяца назад

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS3: 7.5
nvd
2 месяца назад

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

msrc
2 месяца назад

Excessive resource consumption when printing error string for host certificate validation in crypto/x509

CVSS3: 7.5
debian
2 месяца назад

Within HostnameError.Error(), when constructing an error string, there ...

rocky
10 дней назад

Important: grafana-pcp security update