{"affected":[{"ecosystem_specific":{"binaries":[{"libruby2_5-2_5":"2.5.9-150700.24.3.1","ruby2.5":"2.5.9-150700.24.3.1","ruby2.5-devel":"2.5.9-150700.24.3.1","ruby2.5-devel-extra":"2.5.9-150700.24.3.1","ruby2.5-stdlib":"2.5.9-150700.24.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP7","name":"ruby2.5","purl":"pkg:rpm/suse/ruby2.5&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.5.9-150700.24.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for ruby2.5 fixes the following issues:\n\n- CVE-2024-35221: Fixed remote DoS via YAML manifest (bsc#1225905)\n- CVE-2024-47220: Fixed HTTP request smuggling in WEBrick (bsc#1230930)\n- CVE-2024-49761: Fixed ReDOS vulnerability by updating REXML to 3.3.9 (bsc#1232440)\n- CVE-2025-24294: Fixed denial of service (DoS) caused by an insufficient check on the length \n  of a decompressed domain name within a DNS packet in resolv gem (bsc#1246430)\n- CVE-2025-27219: Fixed denial of service in CGI::Cookie.parse (bsc#1237804)\n- CVE-2025-27220: Fixed ReDoS in CGI::Util#escapeElement (bsc#1237806)\n- CVE-2025-27221: Fixed userinfo leakage in URI#join, URI#merge and URI#+ (bsc#1237805)\n- CVE-2025-6442: Fixed ruby WEBrick read_header HTTP request smuggling vulnerability (bsc#1245254)\n","id":"SUSE-SU-2025:4264-1","modified":"2025-11-26T15:52:44Z","published":"2025-11-26T15:52:44Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20254264-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225905"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230930"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232440"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235773"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237804"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237805"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237806"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245254"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246430"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35221"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47220"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49761"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-24294"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-27219"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-27220"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-27221"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-6442"}],"related":["CVE-2024-35221","CVE-2024-47220","CVE-2024-49761","CVE-2025-24294","CVE-2025-27219","CVE-2025-27220","CVE-2025-27221","CVE-2025-6442"],"summary":"Security update for ruby2.5","upstream":["CVE-2024-35221","CVE-2024-47220","CVE-2024-49761","CVE-2025-24294","CVE-2025-27219","CVE-2025-27220","CVE-2025-27221","CVE-2025-6442"]}