diff options
author | Joe Slater <jslater@windriver.com> | 2017-08-18 10:43:44 -0700 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2017-09-11 22:15:58 +0100 |
commit | c63480c9605a22b3000dc4f0e9198e67365832e9 (patch) | |
tree | 06f61b7391e60f35eba0675e96ce225776e1a242 /meta/recipes-devtools/ruby/ruby/ruby-CVE-2017-9226.patch | |
parent | 62e244d71354f20e8680606e015565690f1bd4f5 (diff) | |
download | poky-c63480c9605a22b3000dc4f0e9198e67365832e9.tar.gz |
ruby: fix CVE-2017-922{6-9}
CVE-2017-9226 : check too big code point value for single byte
CVE-2017-9227 : access to invalid address by reg->dmin value
CVE-2017-9228 : invalid state(CCS_VALUE) in parse_char_class()
CVE-2017-9229 : access to invalid address by reg->dmax value
(From OE-Core rev: f15f01edbaa431829a50053d07ed6d6b333584c7)
(From OE-Core rev: 4077e088b6e750c4143a59c5d89258ab682ed96b)
Signed-off-by: Joe Slater <jslater@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/ruby/ruby/ruby-CVE-2017-9226.patch')
-rw-r--r-- | meta/recipes-devtools/ruby/ruby/ruby-CVE-2017-9226.patch | 41 |
1 files changed, 41 insertions, 0 deletions
diff --git a/meta/recipes-devtools/ruby/ruby/ruby-CVE-2017-9226.patch b/meta/recipes-devtools/ruby/ruby/ruby-CVE-2017-9226.patch new file mode 100644 index 0000000000..0f2a4307cc --- /dev/null +++ b/meta/recipes-devtools/ruby/ruby/ruby-CVE-2017-9226.patch | |||
@@ -0,0 +1,41 @@ | |||
1 | From b4bf968ad52afe14e60a2dc8a95d3555c543353a Mon Sep 17 00:00:00 2001 | ||
2 | From: "K.Kosako" <kosako@sofnec.co.jp> | ||
3 | Date: Thu, 18 May 2017 17:05:27 +0900 | ||
4 | Subject: [PATCH] fix #55 : check too big code point value for single byte | ||
5 | value in next_state_val() | ||
6 | |||
7 | --- | ||
8 | regparse.c | 3 +++ | ||
9 | 1 file changed, 3 insertions(+) | ||
10 | |||
11 | --- end of original header | ||
12 | |||
13 | CVE: CVE-2017-9226 | ||
14 | |||
15 | Add check for octal number bigger than 255. | ||
16 | |||
17 | Upstream-Status: Pending | ||
18 | Signed-off-by: Joe Slater <joe.slater@windriver.com> | ||
19 | |||
20 | |||
21 | --- ruby-2.4.1.orig/regparse.c | ||
22 | +++ ruby-2.4.1/regparse.c | ||
23 | @@ -3644,7 +3644,7 @@ fetch_token(OnigToken* tok, UChar** src, | ||
24 | if (IS_SYNTAX_OP(syn, ONIG_SYN_OP_ESC_OCTAL3)) { | ||
25 | prev = p; | ||
26 | num = scan_unsigned_octal_number(&p, end, (c == '0' ? 2:3), enc); | ||
27 | - if (num < 0) return ONIGERR_TOO_BIG_NUMBER; | ||
28 | + if (num < 0 || 0xff < num) return ONIGERR_TOO_BIG_NUMBER; | ||
29 | if (p == prev) { /* can't read nothing. */ | ||
30 | num = 0; /* but, it's not error */ | ||
31 | } | ||
32 | @@ -4450,6 +4450,9 @@ next_state_val(CClassNode* cc, CClassNod | ||
33 | switch (*state) { | ||
34 | case CCS_VALUE: | ||
35 | if (*type == CCV_SB) { | ||
36 | + if (*vs > 0xff) | ||
37 | + return ONIGERR_INVALID_CODE_POINT_VALUE; | ||
38 | + | ||
39 | BITSET_SET_BIT_CHKDUP(cc->bs, (int )(*vs)); | ||
40 | if (IS_NOT_NULL(asc_cc)) | ||
41 | BITSET_SET_BIT(asc_cc->bs, (int )(*vs)); | ||