ruby: Security fix for CVE-2017-9227

affects ruby < 2.4.1

(From OE-Core rev: d83f18936a0eb470e8faf7adbd7c580c23fa3370)

Signed-off-by: Thiruvadi Rajaraman <trajaraman@mvista.com>
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
Thiruvadi Rajaraman 2017-11-04 10:35:54 -07:00 committed by Richard Purdie
parent cab5a620ac
commit 5899c6b77c
2 changed files with 25 additions and 0 deletions

View File

@ -0,0 +1,24 @@
commit 9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814
Author: K.Kosako <kosako@sofnec.co.jp>
Date: Tue May 23 16:15:35 2017 +0900
fix #58 : access to invalid address by reg->dmin value
Upstream-Status: backport
CVE: CVE-2017-9227
Signed-off-by: Thiruvadi Rajaraman <trajaraman@mvista.com>
Index: ruby-2.2.5/regexec.c
===================================================================
--- ruby-2.2.5.orig/regexec.c 2014-09-15 21:48:41.000000000 +0530
+++ ruby-2.2.5/regexec.c 2017-08-30 12:18:04.054828426 +0530
@@ -3678,6 +3678,8 @@
}
else {
UChar *q = p + reg->dmin;
+
+ if (q >= end) return 0; /* fail */
while (p < q) p += enclen(reg->enc, p, end);
}
}

View File

@ -5,6 +5,7 @@ SRC_URI[sha256sum] = "30c4b31697a4ca4ea0c8db8ad30cf45e6690a0f09687e5d483c933c03c
SRC_URI += "file://prevent-gc.patch \
file://CVE-2016-7798.patch \
file://CVE-2017-9227.patch \
"
# it's unknown to configure script, but then passed to extconf.rb