SUSE-CU-2024:5483-1: Security update of bci/ruby

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Mon Nov 4 12:50:14 UTC 2024


SUSE Container Update Advisory: bci/ruby
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2024:5483-1
Container Tags        : bci/ruby:2 , bci/ruby:2.5 , bci/ruby:2.5-29.2 , bci/ruby:latest
Container Release     : 29.2
Severity              : important
Type                  : security
References            : 1193578 1224390 1228072 1228794 1228799 1229673 1231833 CVE-2021-43809
                        CVE-2024-35176 CVE-2024-39908 CVE-2024-41123 CVE-2024-41946 CVE-2024-43398
-----------------------------------------------------------------

The container bci/ruby was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:3865-1
Released:    Fri Nov  1 16:10:37 2024
Summary:     Recommended update for gcc14
Type:        recommended
Severity:    moderate
References:  1231833
This update for gcc14 fixes the following issues:

- Fixed parsing timezone tzdata 2024b [gcc#116657 bsc#1231833]

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:3873-1
Released:    Fri Nov  1 16:22:15 2024
Summary:     Security update for rubygem-bundler
Type:        security
Severity:    important
References:  1193578,CVE-2021-43809
This update for rubygem-bundler fixes the following issues:

- CVE-2021-43809: Fixed remote execution via Gemfile argument injection (bsc#1193578)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:3874-1
Released:    Fri Nov  1 16:24:52 2024
Summary:     Security update for ruby2.5
Type:        security
Severity:    important
References:  1224390,1228072,1228794,1228799,1229673,CVE-2024-35176,CVE-2024-39908,CVE-2024-41123,CVE-2024-41946,CVE-2024-43398
This update for ruby2.5 fixes the following issues:

- CVE-2024-43398: Fixed DoS when parsing a XML that has many deep elements with the same local name attributes (bsc#1229673)
- CVE-2024-41123: Fixed DoS when parsing an XML that contains many specific characters such as whitespaces, >] and ]> (bsc#1228794)
- CVE-2024-41946: Fixed DoS when parsing an XML that has many entity expansions with SAX2 or pull parser API (bsc#1228799)
- CVE-2024-35176: Fixed DoS when parsing an XML that has many left angled brackets in an attribute value (bsc#1224390)
- CVE-2024-39908: Fixed ReDos when parsing an XML that has many specific characters (bsc#1228072)


The following package changes have been done:

- libatomic1-14.2.0+git10526-150000.1.6.1 updated
- libgomp1-14.2.0+git10526-150000.1.6.1 updated
- libitm1-14.2.0+git10526-150000.1.6.1 updated
- liblsan0-14.2.0+git10526-150000.1.6.1 updated
- libruby2_5-2_5-2.5.9-150000.4.32.1 updated
- ruby2.5-stdlib-2.5.9-150000.4.32.1 updated
- ruby2.5-2.5.9-150000.4.32.1 updated
- ruby2.5-rubygem-bundler-1.16.1-150000.3.6.1 updated
- ruby2.5-devel-2.5.9-150000.4.32.1 updated


More information about the sle-container-updates mailing list