Skip to content
This repository has been archived by the owner on Aug 27, 2019. It is now read-only.

bundle update #11

Merged
merged 1 commit into from Aug 13, 2019
Merged

bundle update #11

merged 1 commit into from Aug 13, 2019

Conversation

touhouota
Copy link
Owner

  • nokogiri
    • CHANGELOG
      • A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess by Ruby's Kernel.open method. Processes are vulnerable only if the undocumented method Nokogiri::CSS::Tokenizer#load_file is being passed untrusted user input.

      • This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.

      • This CVE's public notice is CVE-2019-5477 - Nokogiri Command Injection Vulnerability sparklemotion/nokogiri#1915

    • Compare URL

@touhouota touhouota merged commit 0cd4b97 into develop Aug 13, 2019
@touhouota touhouota deleted the bundle_update branch August 13, 2019 15:06
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant