aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorThiruvadi Rajaraman <trajaraman@mvista.com>2017-11-04 10:39:42 -0700
committerArmin Kuster <akuster808@gmail.com>2018-02-22 11:10:46 -0800
commit4b8721666a163c153328bca3d08df7112725467a (patch)
treed8bb7c5cd4c2784bc6b59ffeeabd5fd807fecd1f
parent2fa079af624f0f6a7d1fbe49c3b7dabea5c6f4ff (diff)
downloadopenembedded-core-contrib-4b8721666a163c153328bca3d08df7112725467a.tar.gz
ruby: Secruity fix for CVE-2017-9226
affects ruby < 2.4.1 Signed-off-by: Thiruvadi Rajaraman <trajaraman@mvista.com> Signed-off-by: Armin Kuster <akuster@mvista.com> (cherry picked from commit 0c1eec0c6a789e1e9dbfcc66c3fb8c7d1d8b4e99) Signed-off-by: Armin Kuster <akuster808@gmail.com>
-rw-r--r--meta/recipes-devtools/ruby/ruby/CVE-2017-9226.patch33
-rw-r--r--meta/recipes-devtools/ruby/ruby_2.2.5.bb1
2 files changed, 34 insertions, 0 deletions
diff --git a/meta/recipes-devtools/ruby/ruby/CVE-2017-9226.patch b/meta/recipes-devtools/ruby/ruby/CVE-2017-9226.patch
new file mode 100644
index 0000000000..fc783e8a15
--- /dev/null
+++ b/meta/recipes-devtools/ruby/ruby/CVE-2017-9226.patch
@@ -0,0 +1,33 @@
+commit f015fbdd95f76438cd86366467bb2b39870dd7c6
+Author: K.Kosako <kosako@sofnec.co.jp>
+Date: Fri May 19 15:44:47 2017 +0900
+
+ fix #55 : Byte value expressed in octal must be smaller than 256
+
+Upstream-Status: Backport
+
+CVE: CVE-2017-9226
+Signed-off-by: Thiruvadi Rajaraman <tajaraman@mvista.com>
+
+Index: ruby-2.2.5/regparse.c
+===================================================================
+--- ruby-2.2.5.orig/regparse.c 2017-09-12 16:33:21.977835068 +0530
++++ ruby-2.2.5/regparse.c 2017-09-12 16:34:40.987117744 +0530
+@@ -3222,7 +3222,7 @@
+ PUNFETCH;
+ prev = p;
+ num = scan_unsigned_octal_number(&p, end, 3, enc);
+- if (num < 0) return ONIGERR_TOO_BIG_NUMBER;
++ if (num < 0 || num >= 256) return ONIGERR_TOO_BIG_NUMBER;
+ if (p == prev) { /* can't read nothing. */
+ num = 0; /* but, it's not error */
+ }
+@@ -3676,7 +3676,7 @@
+ if (IS_SYNTAX_OP(syn, ONIG_SYN_OP_ESC_OCTAL3)) {
+ prev = p;
+ num = scan_unsigned_octal_number(&p, end, (c == '0' ? 2:3), enc);
+- if (num < 0) return ONIGERR_TOO_BIG_NUMBER;
++ if (num < 0 || num >= 256) return ONIGERR_TOO_BIG_NUMBER;
+ if (p == prev) { /* can't read nothing. */
+ num = 0; /* but, it's not error */
+ }
diff --git a/meta/recipes-devtools/ruby/ruby_2.2.5.bb b/meta/recipes-devtools/ruby/ruby_2.2.5.bb
index 26cecb2f87..3254ec5700 100644
--- a/meta/recipes-devtools/ruby/ruby_2.2.5.bb
+++ b/meta/recipes-devtools/ruby/ruby_2.2.5.bb
@@ -7,6 +7,7 @@ SRC_URI += "file://prevent-gc.patch \
file://CVE-2016-7798.patch \
file://CVE-2017-9227.patch \
file://CVE-2017-9228.patch \
+ file://CVE-2017-9226.patch \
"
# it's unknown to configure script, but then passed to extconf.rb