[SUSE-SU-2021:0933-1] Security update for ruby2.5
Severity
Important
Affected Packages
46
CVEs
1
Security update for ruby2.5
This update for ruby2.5 fixes the following issues:
- CVE-2020-25613: Fixed a potential HTTP Request Smuggling in WEBrick (bsc#1177125).
- Enable optimizations also on ARM64 (bsc#1177222)
- ID
- SUSE-SU-2021:0933-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2021/suse-su-20210933-1/
- Published
-
2021-03-24T11:17:12
(3 years ago) - Modified
-
2021-03-24T11:17:12
(3 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2020-1451
- ALAS-2021-1468
- ALAS2-2021-1641
- ALPINE:CVE-2020-25613
- ALSA-2021:2584
- ALSA-2021:2587
- ALSA-2021:2588
- ELSA-2021-2584
- ELSA-2021-2587
- ELSA-2021-2588
- FEDORA-2020-02ca18c2a0
- FEDORA-2020-fe2a7d7390
- GLSA-202401-27
- MS:CVE-2020-25613
- openSUSE-SU-2021:0471-1
- RHSA-2021:2584
- RHSA-2021:2587
- RHSA-2021:2588
- RLSA-2021:2584
- RLSA-2021:2587
- RLSA-2021:2588
- RUBYSEC:WEBRICK-2020-25613
- SUSE-SU-2021:3837-1
- USN-4882-1
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0933-1.json | |
Suse | URL for SUSE-SU-2021:0933-1 | https://www.suse.com/support/update/announcement/2021/suse-su-20210933-1/ | |
Suse | E-Mail link for SUSE-SU-2021:0933-1 | https://lists.suse.com/pipermail/sle-security-updates/2021-March/008549.html | |
Bugzilla | SUSE Bug 1177125 | https://bugzilla.suse.com/1177125 | |
Bugzilla | SUSE Bug 1177222 | https://bugzilla.suse.com/1177222 | |
CVE | SUSE CVE CVE-2020-25613 page | https://www.suse.com/security/cve/CVE-2020-25613/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/ruby2.5?arch=x86_64&distro=sles-15&sp=1 | suse | ruby2.5 | < 2.5.8-4.14.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.5?arch=x86_64&distro=sles-15 | suse | ruby2.5 | < 2.5.8-4.14.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.5?arch=x86_64&distro=slem-5 | suse | ruby2.5 | < 2.5.8-4.14.1 | slem-5 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.5?arch=s390x&distro=sles-15&sp=1 | suse | ruby2.5 | < 2.5.8-4.14.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/ruby2.5?arch=s390x&distro=sles-15 | suse | ruby2.5 | < 2.5.8-4.14.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/ruby2.5?arch=ppc64le&distro=sles-15&sp=1 | suse | ruby2.5 | < 2.5.8-4.14.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.5?arch=ppc64le&distro=sles-15 | suse | ruby2.5 | < 2.5.8-4.14.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.5?arch=aarch64&distro=sles-15&sp=1 | suse | ruby2.5 | < 2.5.8-4.14.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/ruby2.5?arch=aarch64&distro=sles-15 | suse | ruby2.5 | < 2.5.8-4.14.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/ruby2.5?arch=aarch64&distro=slem-5 | suse | ruby2.5 | < 2.5.8-4.14.1 | slem-5 | aarch64 | |
Affected | pkg:rpm/suse/ruby2.5-stdlib?arch=x86_64&distro=sles-15&sp=1 | suse | ruby2.5-stdlib | < 2.5.8-4.14.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.5-stdlib?arch=x86_64&distro=sles-15 | suse | ruby2.5-stdlib | < 2.5.8-4.14.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.5-stdlib?arch=x86_64&distro=slem-5 | suse | ruby2.5-stdlib | < 2.5.8-4.14.1 | slem-5 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.5-stdlib?arch=s390x&distro=sles-15&sp=1 | suse | ruby2.5-stdlib | < 2.5.8-4.14.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/ruby2.5-stdlib?arch=s390x&distro=sles-15 | suse | ruby2.5-stdlib | < 2.5.8-4.14.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/ruby2.5-stdlib?arch=ppc64le&distro=sles-15&sp=1 | suse | ruby2.5-stdlib | < 2.5.8-4.14.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.5-stdlib?arch=ppc64le&distro=sles-15 | suse | ruby2.5-stdlib | < 2.5.8-4.14.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.5-stdlib?arch=aarch64&distro=sles-15&sp=1 | suse | ruby2.5-stdlib | < 2.5.8-4.14.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/ruby2.5-stdlib?arch=aarch64&distro=sles-15 | suse | ruby2.5-stdlib | < 2.5.8-4.14.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/ruby2.5-stdlib?arch=aarch64&distro=slem-5 | suse | ruby2.5-stdlib | < 2.5.8-4.14.1 | slem-5 | aarch64 | |
Affected | pkg:rpm/suse/ruby2.5-devel?arch=x86_64&distro=sles-15&sp=1 | suse | ruby2.5-devel | < 2.5.8-4.14.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.5-devel?arch=x86_64&distro=sles-15 | suse | ruby2.5-devel | < 2.5.8-4.14.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.5-devel?arch=s390x&distro=sles-15&sp=1 | suse | ruby2.5-devel | < 2.5.8-4.14.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/ruby2.5-devel?arch=s390x&distro=sles-15 | suse | ruby2.5-devel | < 2.5.8-4.14.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/ruby2.5-devel?arch=ppc64le&distro=sles-15&sp=1 | suse | ruby2.5-devel | < 2.5.8-4.14.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.5-devel?arch=ppc64le&distro=sles-15 | suse | ruby2.5-devel | < 2.5.8-4.14.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.5-devel?arch=aarch64&distro=sles-15&sp=1 | suse | ruby2.5-devel | < 2.5.8-4.14.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/ruby2.5-devel?arch=aarch64&distro=sles-15 | suse | ruby2.5-devel | < 2.5.8-4.14.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/ruby2.5-devel-extra?arch=x86_64&distro=sles-15&sp=1 | suse | ruby2.5-devel-extra | < 2.5.8-4.14.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.5-devel-extra?arch=x86_64&distro=sles-15 | suse | ruby2.5-devel-extra | < 2.5.8-4.14.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.5-devel-extra?arch=s390x&distro=sles-15&sp=1 | suse | ruby2.5-devel-extra | < 2.5.8-4.14.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/ruby2.5-devel-extra?arch=s390x&distro=sles-15 | suse | ruby2.5-devel-extra | < 2.5.8-4.14.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/ruby2.5-devel-extra?arch=ppc64le&distro=sles-15&sp=1 | suse | ruby2.5-devel-extra | < 2.5.8-4.14.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.5-devel-extra?arch=ppc64le&distro=sles-15 | suse | ruby2.5-devel-extra | < 2.5.8-4.14.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.5-devel-extra?arch=aarch64&distro=sles-15&sp=1 | suse | ruby2.5-devel-extra | < 2.5.8-4.14.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/ruby2.5-devel-extra?arch=aarch64&distro=sles-15 | suse | ruby2.5-devel-extra | < 2.5.8-4.14.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/libruby2_5-2_5?arch=x86_64&distro=sles-15&sp=1 | suse | libruby2_5-2_5 | < 2.5.8-4.14.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/libruby2_5-2_5?arch=x86_64&distro=sles-15 | suse | libruby2_5-2_5 | < 2.5.8-4.14.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/libruby2_5-2_5?arch=x86_64&distro=slem-5 | suse | libruby2_5-2_5 | < 2.5.8-4.14.1 | slem-5 | x86_64 | |
Affected | pkg:rpm/suse/libruby2_5-2_5?arch=s390x&distro=sles-15&sp=1 | suse | libruby2_5-2_5 | < 2.5.8-4.14.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/libruby2_5-2_5?arch=s390x&distro=sles-15 | suse | libruby2_5-2_5 | < 2.5.8-4.14.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/libruby2_5-2_5?arch=ppc64le&distro=sles-15&sp=1 | suse | libruby2_5-2_5 | < 2.5.8-4.14.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/libruby2_5-2_5?arch=ppc64le&distro=sles-15 | suse | libruby2_5-2_5 | < 2.5.8-4.14.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/libruby2_5-2_5?arch=aarch64&distro=sles-15&sp=1 | suse | libruby2_5-2_5 | < 2.5.8-4.14.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/libruby2_5-2_5?arch=aarch64&distro=sles-15 | suse | libruby2_5-2_5 | < 2.5.8-4.14.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/libruby2_5-2_5?arch=aarch64&distro=slem-5 | suse | libruby2_5-2_5 | < 2.5.8-4.14.1 | slem-5 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |