[#101179] Spectre Mitigations — Amel <amel.smajic@...>
Hi there!
5 messages
2020/12/01
[#101180] Re: Spectre Mitigations
— Chris Seaton <chris@...>
2020/12/01
I wouldn’t recommend using Ruby to run in-process untrusted code in the first place. Are people doing that?
[#101694] Ruby 3.0.0 Released — "NARUSE, Yui" <naruse@...>
We are pleased to announce the release of Ruby 3.0.0. From 2015 we
4 messages
2020/12/25
[ruby-core:101310] [Ruby master Bug#16762] Ruby is not properly fortified on armv7hl
From:
samuel@...
Date:
2020-12-08 08:22:11 UTC
List:
ruby-core #101310
Issue #16762 has been updated by ioquatix (Samuel Williams).
https://github.com/ruby/ruby/pull/3866
----------------------------------------
Bug #16762: Ruby is not properly fortified on armv7hl
https://bugs.ruby-lang.org/issues/16762#change-89005
* Author: vo.x (Vit Ondruch)
* Status: Assigned
* Priority: Normal
* Assignee: ioquatix (Samuel Williams)
* ruby -v: ruby 2.8.0dev (2020-04-03 master 810d66f3e7) [armv7hl-linux]
* Backport: 2.5: UNKNOWN, 2.6: UNKNOWN, 2.7: UNKNOWN
----------------------------------------
The issue is similar to #15335 and the fix is also similar:
~~~
diff --git a/coroutine/arm32/Context.S b/coroutine/arm32/Context.S
index b66db29622..596284b5cf 100644
--- a/coroutine/arm32/Context.S
+++ b/coroutine/arm32/Context.S
@@ -24,3 +24,7 @@ coroutine_transfer:
# Restore callee state (8 registers program counter)
pop {r4-r11,pc}
+
+#if defined(__linux__) && defined(__ELF__)
+.section .note.GNU-stack,"",%progbits
+#endif
~~~
It seems to be introduced by https://github.com/ruby/ruby/pull/2995
--
https://bugs.ruby-lang.org/
Unsubscribe: <mailto:ruby-core-request@ruby-lang.org?subject=unsubscribe>
<http://lists.ruby-lang.org/cgi-bin/mailman/options/ruby-core>