]> code.ossystems Code Review - openembedded-core.git/commitdiff
ruby: Secruity fix for CVE-2017-9226
authorThiruvadi Rajaraman <trajaraman@mvista.com>
Sat, 4 Nov 2017 17:39:42 +0000 (10:39 -0700)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Tue, 21 Nov 2017 14:42:58 +0000 (14:42 +0000)
affects ruby < 2.4.1

Signed-off-by: Thiruvadi Rajaraman <trajaraman@mvista.com>
Signed-off-by: Armin Kuster <akuster@mvista.com>
meta/recipes-devtools/ruby/ruby/CVE-2017-9226.patch [new file with mode: 0644]
meta/recipes-devtools/ruby/ruby_2.2.5.bb

diff --git a/meta/recipes-devtools/ruby/ruby/CVE-2017-9226.patch b/meta/recipes-devtools/ruby/ruby/CVE-2017-9226.patch
new file mode 100644 (file)
index 0000000..fc783e8
--- /dev/null
@@ -0,0 +1,33 @@
+commit f015fbdd95f76438cd86366467bb2b39870dd7c6
+Author: K.Kosako <kosako@sofnec.co.jp>
+Date:   Fri May 19 15:44:47 2017 +0900
+
+    fix #55 : Byte value expressed in octal must be smaller than 256
+
+Upstream-Status: Backport
+
+CVE: CVE-2017-9226
+Signed-off-by: Thiruvadi Rajaraman <tajaraman@mvista.com>
+
+Index: ruby-2.2.5/regparse.c
+===================================================================
+--- ruby-2.2.5.orig/regparse.c 2017-09-12 16:33:21.977835068 +0530
++++ ruby-2.2.5/regparse.c      2017-09-12 16:34:40.987117744 +0530
+@@ -3222,7 +3222,7 @@
+       PUNFETCH;
+       prev = p;
+       num = scan_unsigned_octal_number(&p, end, 3, enc);
+-      if (num < 0) return ONIGERR_TOO_BIG_NUMBER;
++      if (num < 0 || num >= 256) return ONIGERR_TOO_BIG_NUMBER;
+       if (p == prev) {  /* can't read nothing. */
+         num = 0; /* but, it's not error */
+       }
+@@ -3676,7 +3676,7 @@
+       if (IS_SYNTAX_OP(syn, ONIG_SYN_OP_ESC_OCTAL3)) {
+       prev = p;
+       num = scan_unsigned_octal_number(&p, end, (c == '0' ? 2:3), enc);
+-      if (num < 0) return ONIGERR_TOO_BIG_NUMBER;
++      if (num < 0 || num >= 256) return ONIGERR_TOO_BIG_NUMBER;
+       if (p == prev) {  /* can't read nothing. */
+         num = 0; /* but, it's not error */
+       }
index bdb2121eff70e3f3aaa83abf2816d06426a62a9d..b32a705a5b1c034556dc266132e05a5c76408362 100644 (file)
@@ -7,6 +7,7 @@ SRC_URI += "file://prevent-gc.patch \
             file://CVE-2016-7798.patch \
             file://CVE-2017-9227.patch \
             file://CVE-2017-9228.patch \
+            file://CVE-2017-9226.patch \
 "
 
 # it's unknown to configure script, but then passed to extconf.rb