Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2026-3842

Опубликовано: 05 мар. 2026
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2026-3842: delve security update (MODERATE)

[1.25.2-2.0.1]

  • Disable DWARF compression which has issues (Alex Burmashev)

[1.25.2-2]

  • Rebuild without changes.
  • Resolves: RHEL-153104

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

delve

1.25.2-2.0.1.el9_7

Oracle Linux x86_64

delve

1.25.2-2.0.1.el9_7

Связанные CVE

Связанные уязвимости

CVSS3: 10
ubuntu
около 2 месяцев назад

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

CVSS3: 7.4
redhat
около 2 месяцев назад

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

CVSS3: 10
nvd
около 2 месяцев назад

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

msrc
21 день назад

Unexpected session resumption in crypto/tls

CVSS3: 10
debian
около 2 месяцев назад

During session resumption in crypto/tls, if the underlying Config has ...