summaryrefslogtreecommitdiffstats
path: root/meta
diff options
context:
space:
mode:
authorLee Chee Yang <chee.yang.lee@intel.com>2021-06-09 16:54:49 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2021-06-19 16:59:29 +0100
commit7860e4b563b1d928847304e57a6cdc0815134417 (patch)
treec7bbd809966f9e2cc8d06bf6617ffa79090c86ce /meta
parent1ed30171a60d71c8d0fed3eedf2592e52a88f4d6 (diff)
downloadpoky-7860e4b563b1d928847304e57a6cdc0815134417.tar.gz
ruby: 2.7.1 -> 2.7.3
This release includes security fixes. CVE-2021-28965: XML round-trip vulnerability in REXML CVE-2021-28966: Path traversal in Tempfile on Windows CVE-2020-25613 fixed in 2.7.2, do drop the patch release notes for 2.7.2 and 2.7.3 https://www.ruby-lang.org/en/news/2020/10/02/ruby-2-7-2-released/ https://www.ruby-lang.org/en/news/2021/04/05/ruby-2-7-3-released/ (From OE-Core rev: 4de0d54827bc4645b69e5a0043b6f285b0193402) Signed-off-by: Lee Chee Yang <chee.yang.lee@intel.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r--meta/recipes-devtools/ruby/ruby/CVE-2020-25613.patch40
-rw-r--r--meta/recipes-devtools/ruby/ruby_2.7.3.bb (renamed from meta/recipes-devtools/ruby/ruby_2.7.1.bb)5
2 files changed, 2 insertions, 43 deletions
diff --git a/meta/recipes-devtools/ruby/ruby/CVE-2020-25613.patch b/meta/recipes-devtools/ruby/ruby/CVE-2020-25613.patch
deleted file mode 100644
index 1abcb7547e..0000000000
--- a/meta/recipes-devtools/ruby/ruby/CVE-2020-25613.patch
+++ /dev/null
@@ -1,40 +0,0 @@
1From 8946bb38b4d87549f0d99ed73c62c41933f97cc7 Mon Sep 17 00:00:00 2001
2From: Yusuke Endoh <mame@ruby-lang.org>
3Date: Tue, 29 Sep 2020 13:15:58 +0900
4Subject: [PATCH] Make it more strict to interpret some headers
5
6Some regexps were too tolerant.
7
8Upstream-Status: Backport
9[https://github.com/ruby/webrick/commit/8946bb38b4d87549f0d99ed73c62c41933f97cc7]
10CVE: CVE-2020-25613
11Signed-off-by: Chee Yang Lee <chee.yang.lee@intel.com>
12---
13 lib/webrick/httprequest.rb | 6 +++---
14 1 file changed, 3 insertions(+), 3 deletions(-)
15
16diff --git a/lib/webrick/httprequest.rb b/lib/webrick/httprequest.rb
17index 294bd91..d34eac7 100644
18--- a/lib/webrick/httprequest.rb
19+++ b/lib/webrick/httprequest.rb
20@@ -227,9 +227,9 @@ def parse(socket=nil)
21 raise HTTPStatus::BadRequest, "bad URI `#{@unparsed_uri}'."
22 end
23
24- if /close/io =~ self["connection"]
25+ if /\Aclose\z/io =~ self["connection"]
26 @keep_alive = false
27- elsif /keep-alive/io =~ self["connection"]
28+ elsif /\Akeep-alive\z/io =~ self["connection"]
29 @keep_alive = true
30 elsif @http_version < "1.1"
31 @keep_alive = false
32@@ -508,7 +508,7 @@ def read_body(socket, block)
33 return unless socket
34 if tc = self['transfer-encoding']
35 case tc
36- when /chunked/io then read_chunked(socket, block)
37+ when /\Achunked\z/io then read_chunked(socket, block)
38 else raise HTTPStatus::NotImplemented, "Transfer-Encoding: #{tc}."
39 end
40 elsif self['content-length'] || @remaining_size
diff --git a/meta/recipes-devtools/ruby/ruby_2.7.1.bb b/meta/recipes-devtools/ruby/ruby_2.7.3.bb
index a6c65e887b..318b9acdae 100644
--- a/meta/recipes-devtools/ruby/ruby_2.7.1.bb
+++ b/meta/recipes-devtools/ruby/ruby_2.7.3.bb
@@ -6,12 +6,11 @@ SRC_URI += " \
6 file://remove_has_include_macros.patch \ 6 file://remove_has_include_macros.patch \
7 file://run-ptest \ 7 file://run-ptest \
8 file://0001-Modify-shebang-of-libexec-y2racc-and-libexec-racc2y.patch \ 8 file://0001-Modify-shebang-of-libexec-y2racc-and-libexec-racc2y.patch \
9 file://CVE-2020-25613.patch \
10 file://0001-template-Makefile.in-do-not-write-host-cross-cc-item.patch \ 9 file://0001-template-Makefile.in-do-not-write-host-cross-cc-item.patch \
11 " 10 "
12 11
13SRC_URI[md5sum] = "debb9c325bf65021214451660f46e909" 12SRC_URI[md5sum] = "72ef97685008981de3ddb748d0dab31f"
14SRC_URI[sha256sum] = "d418483bdd0000576c1370571121a6eb24582116db0b7bb2005e90e250eae418" 13SRC_URI[sha256sum] = "8925a95e31d8f2c81749025a52a544ea1d05dad18794e6828709268b92e55338"
15 14
16PACKAGECONFIG ??= "" 15PACKAGECONFIG ??= ""
17PACKAGECONFIG += "${@bb.utils.filter('DISTRO_FEATURES', 'ipv6', d)}" 16PACKAGECONFIG += "${@bb.utils.filter('DISTRO_FEATURES', 'ipv6', d)}"