[#97536] [Ruby master Bug#16694] JIT vs hardened GCC with PCH — v.ondruch@...
Issue #16694 has been reported by vo.x (Vit Ondruch).
11 messages
2020/03/18
[ruby-core:97636] [Ruby master Bug#16698] Backport security fix for CVE-2020-10663
From:
usa@...
Date:
2020-03-30 22:22:15 UTC
List:
ruby-core #97636
Issue #16698 has been updated by usa (Usaku NAKAMURA). Backport changed from 2.4: REQUIRED, 2.5: REQUIRED, 2.6: DONE, 2.7: DONTNEED to 2.4: REQUIRED, 2.5: DONE, 2.6: DONE, 2.7: DONTNEED ruby_2_5 r67869 merged revision(s) 36e9ed7fef6eb2d14becf6c52452e4ab16e4bf01. ---------------------------------------- Bug #16698: Backport security fix for CVE-2020-10663 https://bugs.ruby-lang.org/issues/16698#change-84832 * Author: jeremyevans0 (Jeremy Evans) * Status: Closed * Priority: Normal * Backport: 2.4: REQUIRED, 2.5: DONE, 2.6: DONE, 2.7: DONTNEED ---------------------------------------- As announced at https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/, you can upgrade the JSON gem to 2.3.0 to work around the security issue. However, that brings in new features and not just the security fix. The security issue itself is easy to fix in older ruby versions, and I think the next releases of Ruby 2.4, 2.5, and 2.6 should contain just this security fix without a JSON version upgrade. I'm not sure if we plan a security release of Ruby 2.4 before it goes fully out of support, but I think we should have one. Attached is a patch for ruby 2.6. It applies cleanly to ruby 2.4 and 2.5 (with some offsets). ---Files-------------------------------- ruby-2-6-json-cve-2020-10663.patch (1.05 KB) -- https://bugs.ruby-lang.org/ Unsubscribe: <mailto:ruby-core-request@ruby-lang.org?subject=unsubscribe> <http://lists.ruby-lang.org/cgi-bin/mailman/options/ruby-core>