Files
poky/meta/recipes-devtools/ruby/ruby/CVE-2017-9228.patch
Thiruvadi Rajaraman 7f7e00483a ruby: Security fix for CVE-2017-9228
affects ruby < 2.4.1

(From OE-Core rev: cdfb60a7b573c034868ef27d8eb2c667f2a7ad1d)

Signed-off-by: Thiruvadi Rajaraman <trajaraman@mvista.com>
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2017-11-21 14:43:55 +00:00

27 lines
674 B
Diff

commit 3b63d12038c8d8fc278e81c942fa9bec7c704c8b
Author: K.Kosako <kosako@sofnec.co.jp>
Date: Wed May 24 13:43:25 2017 +0900
fix #60 : invalid state(CCS_VALUE) in parse_char_class()
Upstream-Status: Backport
CVE: CVE-2017-9228
Signed-off-by: Thiruvadi Rajaraman <trajaraman@mvista.com>
Index: ruby-2.2.5/regparse.c
===================================================================
--- ruby-2.2.5.orig/regparse.c 2014-09-16 08:14:10.000000000 +0530
+++ ruby-2.2.5/regparse.c 2017-08-30 11:58:25.774275722 +0530
@@ -4458,7 +4458,9 @@
}
}
- *state = CCS_VALUE;
+ if (*state != CCS_START)
+ *state = CCS_VALUE;
+
*type = CCV_CLASS;
return 0;
}