poky/meta/recipes-devtools/ruby/ruby/CVE-2017-9227.patch
Thiruvadi Rajaraman 5899c6b77c ruby: Security fix for CVE-2017-9227
affects ruby < 2.4.1

(From OE-Core rev: d83f18936a0eb470e8faf7adbd7c580c23fa3370)

Signed-off-by: Thiruvadi Rajaraman <trajaraman@mvista.com>
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2017-11-21 14:43:55 +00:00

25 lines
698 B
Diff

commit 9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814
Author: K.Kosako <kosako@sofnec.co.jp>
Date: Tue May 23 16:15:35 2017 +0900
fix #58 : access to invalid address by reg->dmin value
Upstream-Status: backport
CVE: CVE-2017-9227
Signed-off-by: Thiruvadi Rajaraman <trajaraman@mvista.com>
Index: ruby-2.2.5/regexec.c
===================================================================
--- ruby-2.2.5.orig/regexec.c 2014-09-15 21:48:41.000000000 +0530
+++ ruby-2.2.5/regexec.c 2017-08-30 12:18:04.054828426 +0530
@@ -3678,6 +3678,8 @@
}
else {
UChar *q = p + reg->dmin;
+
+ if (q >= end) return 0; /* fail */
while (p < q) p += enclen(reg->enc, p, end);
}
}