chore(deps): update dependency nokogiri to v1.19.1 [security]#3361
chore(deps): update dependency nokogiri to v1.19.1 [security]#3361renovate-bot wants to merge 1 commit intoGoogleCloudPlatform:mainfrom
Conversation
|
/gcbrun |
Summary of ChangesHello @renovate-bot, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request upgrades the Highlights
Changelog
Activity
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
There was a problem hiding this comment.
Code Review
This pull request updates the nokogiri dependency to version 1.19.1, addressing a medium-severity security vulnerability (GHSA-wx95-c6cv-8532). The change in Gemfile.lock is correct. However, I've identified a potential issue where the Gemfile is not updated accordingly. My review includes a recommendation to update the Gemfile to enforce the use of the patched version of nokogiri, preventing accidental installations of vulnerable versions in the future.
| net-ssh (>= 4.0.0) | ||
| netrc (0.11.0) | ||
| nokogiri (1.18.9) | ||
| nokogiri (1.19.1) |
There was a problem hiding this comment.
This update to nokogiri to version 1.19.1 patches a security vulnerability. However, the corresponding Gemfile still specifies ~> 1.18, which allows versions older than 1.19.1 that are vulnerable.
If the Gemfile.lock were to be removed or regenerated, a vulnerable version of nokogiri could be installed.
To prevent this, I recommend updating line 19 of infra/build/developer-tools/build/data/Gemfile to require at least the patched version.
From:
gem 'nokogiri', '~> 1.18'To:
gem 'nokogiri', '~> 1.19', '>= 1.19.1'This will ensure that only versions >= 1.19.1 and < 2.0 are installed, which includes the security fix and allows for future minor and patch releases within the 1.x series.
485ac92 to
0149dd0
Compare
|
/gcbrun |
0149dd0 to
765782e
Compare
|
/gcbrun |
765782e to
0ed8d2d
Compare
|
/gcbrun |
0ed8d2d to
2ca08e6
Compare
|
/gcbrun |
2ca08e6 to
1e8f61e
Compare
|
/gcbrun |
1e8f61e to
19a6416
Compare
|
/gcbrun |
19a6416 to
fcf95ab
Compare
|
/gcbrun |
fcf95ab to
78f6e19
Compare
|
/gcbrun |
78f6e19 to
d4f6151
Compare
|
/gcbrun |
d4f6151 to
a752ebb
Compare
|
/gcbrun |
a752ebb to
67d48b4
Compare
|
/gcbrun |
67d48b4 to
a1507ff
Compare
|
/gcbrun |
a1507ff to
c19b0d9
Compare
|
/gcbrun |
c19b0d9 to
3c724bc
Compare
|
/gcbrun |
3c724bc to
cb683df
Compare
|
/gcbrun |
cb683df to
450e400
Compare
|
/gcbrun |
450e400 to
339d747
Compare
|
/gcbrun |
339d747 to
d89ae57
Compare
|
/gcbrun |
d89ae57 to
9dcb832
Compare
|
/gcbrun |
This PR contains the following updates:
1.18.9→1.19.1GitHub Vulnerability Alerts
GHSA-wx95-c6cv-8532
Summary
Nokogiri's CRuby extension fails to check the return value from
xmlC14NExecutein the methodNokogiri::XML::Document#canonicalizeandNokogiri::XML::Node#canonicalize. When canonicalization fails, an empty string is returned instead of raising an exception. This incorrect return value may allow downstream libraries to accept invalid or incomplete canonicalized XML, which has been demonstrated to enable signature validation bypass in SAML libraries.JRuby is not affected, as the Java implementation correctly raises
RuntimeErroron canonicalization failure.Mitigation
Upgrade to Nokogiri
>= 1.19.1.Severity
The maintainers have assessed this as Medium severity. Nokogiri itself is a parsing library without a clear security boundary related to canonicalization, so the direct impact is that a method returns incorrect data on invalid input. However, this behavior was exploited in practice to bypass SAML signature validation in downstream libraries (see References).
Credit
This vulnerability was responsibly reported by HackerOne researcher
d4d.Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.