SUSE alert SUSE-SU-2025:3776-1 (ruby2.5)
| From: | OPENSUSE-SECURITY-UPDATES <null@suse.de> | |
| To: | security-announce@lists.opensuse.org | |
| Subject: | SUSE-SU-2025:3776-1: moderate: Security update for ruby2.5 | |
| Date: | Fri, 24 Oct 2025 16:31:13 -0000 | |
| Message-ID: | <176132347384.31037.6780532059738755692@smelt2.prg2.suse.org> | |
| Archive-link: | Article |
# Security update for ruby2.5 Announcement ID: SUSE-SU-2025:3776-1 Release Date: 2025-10-24T13:25:50Z Rating: moderate References: * bsc#1246430 Cross-References: * CVE-2025-24294 CVSS scores: * CVE-2025-24294 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-24294 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-24294 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for ruby2.5 fixes the following issues: * CVE-2025-24294: resolv: insufficient checks on the length of a decompressed domain name when processing a DNS packet can lead to a denial of service due to excessive resource consumption (bsc#1246430). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3776=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3776=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * ruby2.5-2.5.9-150000.4.54.1 * ruby2.5-devel-extra-2.5.9-150000.4.54.1 * ruby2.5-doc-2.5.9-150000.4.54.1 * ruby2.5-stdlib-2.5.9-150000.4.54.1 * ruby2.5-debugsource-2.5.9-150000.4.54.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.54.1 * ruby2.5-devel-2.5.9-150000.4.54.1 * ruby2.5-debuginfo-2.5.9-150000.4.54.1 * libruby2_5-2_5-2.5.9-150000.4.54.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.54.1 * openSUSE Leap 15.6 (noarch) * ruby2.5-doc-ri-2.5.9-150000.4.54.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * ruby2.5-2.5.9-150000.4.54.1 * ruby2.5-devel-extra-2.5.9-150000.4.54.1 * ruby2.5-stdlib-2.5.9-150000.4.54.1 * ruby2.5-debugsource-2.5.9-150000.4.54.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.54.1 * ruby2.5-devel-2.5.9-150000.4.54.1 * ruby2.5-debuginfo-2.5.9-150000.4.54.1 * libruby2_5-2_5-2.5.9-150000.4.54.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.54.1 ## References: * https://www.suse.com/security/cve/CVE-2025-24294.html * https://bugzilla.suse.com/show_bug.cgi?id=1246430
Attachment: None (type=text/html)
(HTML attachment elided)
