Security update for ruby2.5
| Announcement ID: | SUSE-SU-2025:4264-1 |
|---|---|
| Release Date: | 2025-11-26T15:52:48Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves eight vulnerabilities and has one security fix can now be installed.
Description:
This update for ruby2.5 fixes the following issues:
- CVE-2024-35221: Fixed remote DoS via YAML manifest (bsc#1225905)
- CVE-2024-47220: Fixed HTTP request smuggling in WEBrick (bsc#1230930)
- CVE-2024-49761: Fixed ReDOS vulnerability by updating REXML to 3.3.9 (bsc#1232440)
- CVE-2025-24294: Fixed denial of service (DoS) caused by an insufficient check on the length of a decompressed domain name within a DNS packet in resolv gem (bsc#1246430)
- CVE-2025-27219: Fixed denial of service in CGI::Cookie.parse (bsc#1237804)
- CVE-2025-27220: Fixed ReDoS in CGI::Util#escapeElement (bsc#1237806)
- CVE-2025-27221: Fixed userinfo leakage in URI#join, URI#merge and URI#+ (bsc#1237805)
- CVE-2025-6442: Fixed ruby WEBrick read_header HTTP request smuggling vulnerability (bsc#1245254)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4264=1
Package List:
-
Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
- ruby2.5-stdlib-2.5.9-150700.24.3.1
- ruby2.5-devel-2.5.9-150700.24.3.1
- ruby2.5-debuginfo-2.5.9-150700.24.3.1
- ruby2.5-debugsource-2.5.9-150700.24.3.1
- libruby2_5-2_5-debuginfo-2.5.9-150700.24.3.1
- ruby2.5-2.5.9-150700.24.3.1
- libruby2_5-2_5-2.5.9-150700.24.3.1
- ruby2.5-stdlib-debuginfo-2.5.9-150700.24.3.1
- ruby2.5-devel-extra-2.5.9-150700.24.3.1
References:
- https://www.suse.com/security/cve/CVE-2024-35221.html
- https://www.suse.com/security/cve/CVE-2024-47220.html
- https://www.suse.com/security/cve/CVE-2024-49761.html
- https://www.suse.com/security/cve/CVE-2025-24294.html
- https://www.suse.com/security/cve/CVE-2025-27219.html
- https://www.suse.com/security/cve/CVE-2025-27220.html
- https://www.suse.com/security/cve/CVE-2025-27221.html
- https://www.suse.com/security/cve/CVE-2025-6442.html
- https://bugzilla.suse.com/show_bug.cgi?id=1225905
- https://bugzilla.suse.com/show_bug.cgi?id=1230930
- https://bugzilla.suse.com/show_bug.cgi?id=1232440
- https://bugzilla.suse.com/show_bug.cgi?id=1235773
- https://bugzilla.suse.com/show_bug.cgi?id=1237804
- https://bugzilla.suse.com/show_bug.cgi?id=1237805
- https://bugzilla.suse.com/show_bug.cgi?id=1237806
- https://bugzilla.suse.com/show_bug.cgi?id=1245254
- https://bugzilla.suse.com/show_bug.cgi?id=1246430