SUSE-CU-2022:862-1: Security update of bci/ruby
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Wed May 4 07:43:25 UTC 2022
SUSE Container Update Advisory: bci/ruby
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:862-1
Container Tags : bci/ruby:2 , bci/ruby:2.5 , bci/ruby:2.5-17.7 , bci/ruby:latest
Container Release : 17.7
Severity : important
Type : security
References : 1188160 1188161 1190375 1193035 1198441 CVE-2021-31799 CVE-2021-31810
CVE-2021-32066 CVE-2021-41817 CVE-2022-28739
-----------------------------------------------------------------
The container bci/ruby was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:1512-1
Released: Tue May 3 16:11:28 2022
Summary: Security update for ruby2.5
Type: security
Severity: important
References: 1188160,1188161,1190375,1193035,1198441,CVE-2021-31799,CVE-2021-31810,CVE-2021-32066,CVE-2021-41817,CVE-2022-28739
This update for ruby2.5 fixes the following issues:
- CVE-2022-28739: Fixed a buffer overrun in String-to-Float conversion (bsc#1198441).
- CVE-2021-41817: Fixed a regular expression denial of service in Date Parsing Methods (bsc#1193035).
- CVE-2021-32066: Fixed a StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
- CVE-2021-31810: Fixed a trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-31799: Fixed a command injection vulnerability in RDoc (bsc#1190375).
The following package changes have been done:
- libruby2_5-2_5-2.5.9-150000.4.23.1 updated
- ruby2.5-devel-2.5.9-150000.4.23.1 updated
- ruby2.5-stdlib-2.5.9-150000.4.23.1 updated
- ruby2.5-2.5.9-150000.4.23.1 updated
More information about the sle-security-updates
mailing list