]> code.ossystems Code Review - openembedded-core.git/commitdiff
ruby: Security fix for CVE-2017-9229
authorThiruvadi Rajaraman <trajaraman@mvista.com>
Sat, 4 Nov 2017 17:41:02 +0000 (10:41 -0700)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Tue, 21 Nov 2017 14:42:58 +0000 (14:42 +0000)
affects ruby < 2.4.1

Signed-off-by: Thiruvadi Rajaraman <trajaraman@mvista.com>
Signed-off-by: Armin Kuster <akuster@mvista.com>
meta/recipes-devtools/ruby/ruby/CVE-2017-9229.patch [new file with mode: 0644]
meta/recipes-devtools/ruby/ruby_2.2.5.bb

diff --git a/meta/recipes-devtools/ruby/ruby/CVE-2017-9229.patch b/meta/recipes-devtools/ruby/ruby/CVE-2017-9229.patch
new file mode 100644 (file)
index 0000000..75bdfad
--- /dev/null
@@ -0,0 +1,36 @@
+commit b690371bbf97794b4a1d3f295d4fb9a8b05d402d
+Author: K.Kosako <kosako@sofnec.co.jp>
+Date:   Wed May 24 10:27:04 2017 +0900
+
+    fix #59 : access to invalid address by reg->dmax value
+
+Upstream-Status: Backport
+
+CVE: CVE-2017-9229
+Signed-off-by: Thiruvadi Rajaraman <trajaraman@mvista.com>
+
+Index: ruby-2.2.5/regexec.c
+===================================================================
+--- ruby-2.2.5.orig/regexec.c  2017-09-13 12:17:08.429254209 +0530
++++ ruby-2.2.5/regexec.c       2017-09-13 12:24:03.365312311 +0530
+@@ -3763,6 +3763,12 @@
+     }
+     else {
+       if (reg->dmax != ONIG_INFINITE_DISTANCE) {
++        if (p - str < reg->dmax) {
++          *low = (UChar* )str;
++          if (low_prev)
++            *low_prev = onigenc_get_prev_char_head(reg->enc, str, *low, end);
++      }
++      else {
+       *low = p - reg->dmax;
+       if (*low > s) {
+         *low = onigenc_get_right_adjust_char_head_with_prev(reg->enc, s,
+@@ -3776,6 +3782,7 @@
+           *low_prev = onigenc_get_prev_char_head(reg->enc,
+                                              (pprev ? pprev : str), *low, end);
+       }
++      }
+       }
+     }
+     /* no needs to adjust *high, *high is used as range check only */
index b32a705a5b1c034556dc266132e05a5c76408362..4b90ee652202c672ecbf7acaf9f85649c00da586 100644 (file)
@@ -8,6 +8,7 @@ SRC_URI += "file://prevent-gc.patch \
             file://CVE-2017-9227.patch \
             file://CVE-2017-9228.patch \
             file://CVE-2017-9226.patch \
+            file://CVE-2017-9229.patch \
 "
 
 # it's unknown to configure script, but then passed to extconf.rb