SUSE-CU-2025:8644-1: Security update of bci/ruby
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Thu Nov 27 08:15:11 UTC 2025
SUSE Container Update Advisory: bci/ruby
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2025:8644-1
Container Tags : bci/ruby:2 , bci/ruby:2.5 , bci/ruby:2.5-19.8
Container Release : 19.8
Severity : important
Type : security
References : 1225905 1230930 1232440 1235773 1237804 1237805 1237806 1245254
1246430 1246697 1250232 CVE-2024-35221 CVE-2024-47220 CVE-2024-49761
CVE-2025-24294 CVE-2025-27219 CVE-2025-27220 CVE-2025-27221 CVE-2025-6442
CVE-2025-9230
-----------------------------------------------------------------
The container bci/ruby was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2890-1
Released: Tue Aug 19 09:54:32 2025
Summary: Recommended update for openssl-1_1
Type: recommended
Severity: moderate
References: 1246697
This update for openssl-1_1 fixes the following issues:
- FIPS: Use the NID_X9_62_prime256v1 curve in ECDSA KAT test
instead of NID_secp256k1. [bsc#1246697]
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3635-1
Released: Fri Oct 17 16:33:06 2025
Summary: Security update for openssl-1_1
Type: security
Severity: important
References: 1250232,CVE-2025-9230
This update for openssl-1_1 fixes the following issues:
- CVE-2025-9230: fixed out of bounds read and write in RFC 3211 KEK unwrap (bsc#1250232)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:4264-1
Released: Wed Nov 26 16:52:41 2025
Summary: Security update for ruby2.5
Type: security
Severity: important
References: 1225905,1230930,1232440,1235773,1237804,1237805,1237806,1245254,1246430,CVE-2024-35221,CVE-2024-47220,CVE-2024-49761,CVE-2025-24294,CVE-2025-27219,CVE-2025-27220,CVE-2025-27221,CVE-2025-6442
This update for ruby2.5 fixes the following issues:
- CVE-2024-35221: Fixed remote DoS via YAML manifest (bsc#1225905)
- CVE-2024-47220: Fixed HTTP request smuggling in WEBrick (bsc#1230930)
- CVE-2024-49761: Fixed ReDOS vulnerability by updating REXML to 3.3.9 (bsc#1232440)
- CVE-2025-24294: Fixed denial of service (DoS) caused by an insufficient check on the length
of a decompressed domain name within a DNS packet in resolv gem (bsc#1246430)
- CVE-2025-27219: Fixed denial of service in CGI::Cookie.parse (bsc#1237804)
- CVE-2025-27220: Fixed ReDoS in CGI::Util#escapeElement (bsc#1237806)
- CVE-2025-27221: Fixed userinfo leakage in URI#join, URI#merge and URI#+ (bsc#1237805)
- CVE-2025-6442: Fixed ruby WEBrick read_header HTTP request smuggling vulnerability (bsc#1245254)
The following package changes have been done:
- libopenssl1_1-1.1.1w-150700.11.6.1 added
- libruby2_5-2_5-2.5.9-150700.24.3.1 updated
- ruby2.5-stdlib-2.5.9-150700.24.3.1 updated
- ruby2.5-2.5.9-150700.24.3.1 updated
- ruby2.5-devel-2.5.9-150700.24.3.1 updated
More information about the sle-container-updates
mailing list