ruby: security fix CVE 2018-1000073

Directory traversal vulnerability as described by
https://nvd.nist.gov/vuln/detail/CVE-2018-1000073.

(From OE-Core rev: 1a0a1785766c12003e3f8848852af84cae203e6b)

Signed-off-by: Joe Slater <joe.slater@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
Joe Slater
2018-07-20 14:10:02 -07:00
committed by Richard Purdie
parent 62f5f01b5b
commit 201cfa33fe
2 changed files with 35 additions and 0 deletions

View File

@@ -0,0 +1,34 @@
From 1b931fc03b819b9a0214be3eaca844ef534175e2 Mon Sep 17 00:00:00 2001
From: Jonathan Claudius <jclaudius@mozilla.com>
Date: Wed, 7 Feb 2018 23:54:52 -0500
Subject: [PATCH] Non-working patch for deducing symlinked base-dirs
---
CVE: CVE-2018-1000073
Fixed in ruby 2.7.6.
Upstream-Status: Backport [github.com/rubygems/rubygems/commit/1b931fc...]
Signed-off-by: Joe Slater <joe.slater@windriver.com>
---
lib/rubygems/package.rb | 2 ++
1 file changed, 2 insertions(+)
diff --git a/lib/rubygems/package.rb b/lib/rubygems/package.rb
index dede959..cb9c74a 100644
--- a/lib/rubygems/package.rb
+++ b/lib/rubygems/package.rb
@@ -421,6 +421,8 @@ EOM
destination_dir = File.expand_path destination_dir
destination = File.join destination_dir, filename
+ destination = File.realpath destination if
+ File.respond_to? :realpath
destination = File.expand_path destination
raise Gem::Package::PathError.new(destination, destination_dir) unless
--
1.7.9.5

View File

@@ -3,6 +3,7 @@ require ruby.inc
SRC_URI += " \
file://ruby-CVE-2017-9226.patch \
file://ruby-CVE-2017-9228.patch \
file://CVE-2018-1000073.patch \
"
SRC_URI[md5sum] = "23867bc8c16c55e43b14dfe0614bcfa8"