summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/ruby/ruby/CVE-2017-9226.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-devtools/ruby/ruby/CVE-2017-9226.patch')
-rw-r--r--meta/recipes-devtools/ruby/ruby/CVE-2017-9226.patch33
1 files changed, 0 insertions, 33 deletions
diff --git a/meta/recipes-devtools/ruby/ruby/CVE-2017-9226.patch b/meta/recipes-devtools/ruby/ruby/CVE-2017-9226.patch
deleted file mode 100644
index fc783e8a15..0000000000
--- a/meta/recipes-devtools/ruby/ruby/CVE-2017-9226.patch
+++ /dev/null
@@ -1,33 +0,0 @@
1commit f015fbdd95f76438cd86366467bb2b39870dd7c6
2Author: K.Kosako <kosako@sofnec.co.jp>
3Date: Fri May 19 15:44:47 2017 +0900
4
5 fix #55 : Byte value expressed in octal must be smaller than 256
6
7Upstream-Status: Backport
8
9CVE: CVE-2017-9226
10Signed-off-by: Thiruvadi Rajaraman <tajaraman@mvista.com>
11
12Index: ruby-2.2.5/regparse.c
13===================================================================
14--- ruby-2.2.5.orig/regparse.c 2017-09-12 16:33:21.977835068 +0530
15+++ ruby-2.2.5/regparse.c 2017-09-12 16:34:40.987117744 +0530
16@@ -3222,7 +3222,7 @@
17 PUNFETCH;
18 prev = p;
19 num = scan_unsigned_octal_number(&p, end, 3, enc);
20- if (num < 0) return ONIGERR_TOO_BIG_NUMBER;
21+ if (num < 0 || num >= 256) return ONIGERR_TOO_BIG_NUMBER;
22 if (p == prev) { /* can't read nothing. */
23 num = 0; /* but, it's not error */
24 }
25@@ -3676,7 +3676,7 @@
26 if (IS_SYNTAX_OP(syn, ONIG_SYN_OP_ESC_OCTAL3)) {
27 prev = p;
28 num = scan_unsigned_octal_number(&p, end, (c == '0' ? 2:3), enc);
29- if (num < 0) return ONIGERR_TOO_BIG_NUMBER;
30+ if (num < 0 || num >= 256) return ONIGERR_TOO_BIG_NUMBER;
31 if (p == prev) { /* can't read nothing. */
32 num = 0; /* but, it's not error */
33 }