SUSE-SU-2025:4264-1

Source
https://www.suse.com/support/update/announcement/2025/suse-su-20254264-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:4264-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2025:4264-1
Upstream
  • CVE-2024-35221
Related
Published
2025-11-26T15:52:44Z
Modified
2026-03-11T07:31:04.936250Z
Summary
Security update for ruby2.5
Details

This update for ruby2.5 fixes the following issues:

  • CVE-2024-35221: Fixed remote DoS via YAML manifest (bsc#1225905)
  • CVE-2024-47220: Fixed HTTP request smuggling in WEBrick (bsc#1230930)
  • CVE-2024-49761: Fixed ReDOS vulnerability by updating REXML to 3.3.9 (bsc#1232440)
  • CVE-2025-24294: Fixed denial of service (DoS) caused by an insufficient check on the length of a decompressed domain name within a DNS packet in resolv gem (bsc#1246430)
  • CVE-2025-27219: Fixed denial of service in CGI::Cookie.parse (bsc#1237804)
  • CVE-2025-27220: Fixed ReDoS in CGI::Util#escapeElement (bsc#1237806)
  • CVE-2025-27221: Fixed userinfo leakage in URI#join, URI#merge and URI#+ (bsc#1237805)
  • CVE-2025-6442: Fixed ruby WEBrick read_header HTTP request smuggling vulnerability (bsc#1245254)
References

Affected packages

SUSE:Linux Enterprise Module for Basesystem 15 SP7 / ruby2.5

Package

Name
ruby2.5
Purl
pkg:rpm/suse/ruby2.5&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.9-150700.24.3.1

Ecosystem specific

{
    "binaries": [
        {
            "ruby2.5": "2.5.9-150700.24.3.1",
            "ruby2.5-devel": "2.5.9-150700.24.3.1",
            "ruby2.5-stdlib": "2.5.9-150700.24.3.1",
            "ruby2.5-devel-extra": "2.5.9-150700.24.3.1",
            "libruby2_5-2_5": "2.5.9-150700.24.3.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:4264-1.json"