Received: by mail.netbsd.org (Postfix, from userid 605) id C32C384F4A; Sat, 14 May 2022 14:33:07 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 0A24184E99 for ; Sat, 14 May 2022 14:33:07 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.netbsd.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id gxZeddDCBdhA for ; Sat, 14 May 2022 14:33:06 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.NetBSD.org [IPv6:2001:470:a085:999:28c:faff:fe03:5984]) by mail.netbsd.org (Postfix) with ESMTP id 2E92184CD8 for ; Sat, 14 May 2022 14:33:06 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id 619FDFAEB; Sat, 14 May 2022 14:33:31 +0000 (UTC) Content-Transfer-Encoding: 7bit Content-Type: multipart/mixed; boundary="_----------=_1652538811147620" MIME-Version: 1.0 Date: Sat, 14 May 2022 14:33:31 +0000 From: "Izumi Tsutsui" Subject: CVS commit: pkgsrc/textproc/ruby-nokogiri To: pkgsrc-changes@NetBSD.org Reply-To: tsutsui@netbsd.org X-Mailer: log_accum Message-Id: <20220514143331.619FDFAEB@cvs.NetBSD.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: Precedence: bulk List-Unsubscribe: This is a multi-part message in MIME format. --_----------=_1652538811147620 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" Module Name: pkgsrc Committed By: tsutsui Date: Sat May 14 14:33:31 UTC 2022 Modified Files: pkgsrc/textproc/ruby-nokogiri: Makefile PLIST distinfo Log Message: ruby-nokogiri: update to 1.13.6. Upstream changes: https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.6 https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.5 1.13.6 / 2022-05-08 Security * [CRuby] Address CVE-2022-29181, improper handling of unexpected data types, related to untrusted inputs to the SAX parsers. See GHSA-xh29-r2w5-wx8m for more information. Improvements * {HTML4,XML}::SAX::{Parser,ParserContext} constructor methods now raise TypeError instead of segfaulting when an incorrect type is passed. 1.13.5 / 2022-05-04 Security * [CRuby] Vendored libxml2 is updated to address CVE-2022-29824. See GHSA-cgx6-hpwq-fhv5 for more information. Dependencies * [CRuby] Vendored libxml2 is updated from v2.9.13 to v2.9.14. Improvements * [CRuby] The libxml2 HTML4 parser no longer exhibits quadratic behavior when recovering some broken markup related to start-of-tag and bare < characters. Changed * [CRuby] The libxml2 HTML4 parser in v2.9.14 recovers from some broken markup differently. Notably, the XML CDATA escape sequence