]> code.ossystems Code Review - openembedded-core.git/commit
ruby: fix CVE-2017-922{6-9}
authorJoe Slater <jslater@windriver.com>
Fri, 18 Aug 2017 17:43:44 +0000 (10:43 -0700)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Mon, 11 Sep 2017 21:15:51 +0000 (22:15 +0100)
commit4077e088b6e750c4143a59c5d89258ab682ed96b
tree4f1d2784a7c00d8aaaf077443294f9e347ed766b
parent7ba25f0d8d95ece5f5d56ace5b1e9c8c797efbc0
ruby: fix CVE-2017-922{6-9}

CVE-2017-9226 : check too big code point value for single byte
CVE-2017-9227 : access to invalid address by reg->dmin value
CVE-2017-9228 : invalid state(CCS_VALUE) in parse_char_class()
CVE-2017-9229 : access to invalid address by reg->dmax value

(From OE-Core rev: f15f01edbaa431829a50053d07ed6d6b333584c7)

Signed-off-by: Joe Slater <jslater@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
meta/recipes-devtools/ruby/ruby/ruby-CVE-2017-9226.patch [new file with mode: 0644]
meta/recipes-devtools/ruby/ruby/ruby-CVE-2017-9227.patch [new file with mode: 0644]
meta/recipes-devtools/ruby/ruby/ruby-CVE-2017-9228.patch [new file with mode: 0644]
meta/recipes-devtools/ruby/ruby/ruby-CVE-2017-9229.patch [new file with mode: 0644]
meta/recipes-devtools/ruby/ruby_2.4.0.bb