diff options
| author | Rob Woolley <rob.woolley@windriver.com> | 2025-07-24 13:12:08 -0700 |
|---|---|---|
| committer | Steve Sakoman <steve@sakoman.com> | 2025-07-30 07:47:48 -0700 |
| commit | 8fa7ff501e27a0ccd9bfc3f3e58a26949cdfc1f0 (patch) | |
| tree | b8b535cbd53667c82f9dc103cbe59e814c2dae60 /meta/recipes-devtools/ruby/ruby_3.1.3.bb | |
| parent | a485d82c25b97f4b7b9f656d60849136fbbde40a (diff) | |
| download | poky-8fa7ff501e27a0ccd9bfc3f3e58a26949cdfc1f0.tar.gz | |
ruby: correct fix for CVE-2024-43398
The previous fix for CVE-2024-43398 did not include patches
to provide context for the changes it made.
This caused an exception at run-time when ruby parsed
rexml/parsers/baseparser.rb. This was first observed when using
ruby-native to build the sdformat recipe.
With these additional backports, the sdformat build proceeds
successfully. The REXML library was also tested manually on-target
with a script that used REXML::Document.new file to parse an
XML file.
(From OE-Core rev: 6bf00fde2d4043c6b558733a33041ce5694342d3)
Signed-off-by: Rob Woolley <rob.woolley@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/recipes-devtools/ruby/ruby_3.1.3.bb')
| -rw-r--r-- | meta/recipes-devtools/ruby/ruby_3.1.3.bb | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/meta/recipes-devtools/ruby/ruby_3.1.3.bb b/meta/recipes-devtools/ruby/ruby_3.1.3.bb index 65d62002ec..19641e5a51 100644 --- a/meta/recipes-devtools/ruby/ruby_3.1.3.bb +++ b/meta/recipes-devtools/ruby/ruby_3.1.3.bb | |||
| @@ -48,7 +48,9 @@ SRC_URI = "http://cache.ruby-lang.org/pub/ruby/${SHRT_VER}/ruby-${PV}.tar.gz \ | |||
| 48 | file://CVE-2024-41946.patch \ | 48 | file://CVE-2024-41946.patch \ |
| 49 | file://CVE-2025-27220.patch \ | 49 | file://CVE-2025-27220.patch \ |
| 50 | file://CVE-2025-27219.patch \ | 50 | file://CVE-2025-27219.patch \ |
| 51 | file://CVE-2024-43398.patch \ | 51 | file://CVE-2024-43398-0001.patch \ |
| 52 | file://CVE-2024-43398-0002.patch \ | ||
| 53 | file://CVE-2024-43398-0003.patch \ | ||
| 52 | file://CVE-2025-27221-0001.patch \ | 54 | file://CVE-2025-27221-0001.patch \ |
| 53 | file://CVE-2025-27221-0002.patch \ | 55 | file://CVE-2025-27221-0002.patch \ |
| 54 | " | 56 | " |
