Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): update rust crate webbrowser to 0.8 [security] - autoclosed #475

Closed
wants to merge 1 commit into from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jul 24, 2024

Mend Renovate

This PR contains the following updates:

Package Type Update Change
webbrowser dependencies minor 0.7 -> 0.8

GitHub Vulnerability Alerts

CVE-2022-45299

An issue in the IpFile argument of rust-lang webbrowser-rs v0.8.2 allows attackers to access arbitrary files via supplying a crafted URL.


Release Notes

amodm/webbrowser-rs (webbrowser)

v0.8.3

Compare Source

Added
  • Web browser is guaranteed to open for local files even if local file association was to a non-browser app (say an editor). This now is formally
    incorporated as part of this crate's Consistent Behaviour
  • WSL support, thanks to @​Nachtalb. This works even if wslu is not installed in WSL environments.
  • A new feature hardened now available for applications which require only http(s) urls to be opened. This acts as a security feature.
Changed
  • On macOS, we now use CoreFoundation library instead of open command.
  • On Linux/*BSD, we now parse xdg configuration to execute the command directly, instead of using xdg-open command. This allows us to open the
    browser for local html files, even if the .html extension was associated with an edit (see #​55)
Fixed
  • The guarantee of web browser being opened (instead of local file association), now solves for the scenario where the URL is crafted to be an
    executable. This was reported privately by @​offalltn.

v0.8.2

Compare Source

Fixed
  • Fix app crashes when running under termux on Android. See #​53 and #​54.

v0.8.1

Compare Source

Fixed

v0.8.0

Compare Source

Added
Changed
  • Updated all dependencies to current versions

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link
Contributor Author

renovate bot commented Jul 24, 2024

⚠️ Artifact update problem

Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.

♻ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you click the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: src-tauri/Cargo.lock
Command failed: cargo update --config net.git-fetch-with-cli=true --manifest-path src-tauri/Cargo.toml --package [email protected] --precise 0.8.3
error: package ID specification `[email protected]` did not match any packages
Did you mean one of these?

  [email protected]

Copy link

@renovate renovate bot changed the title fix(deps): update rust crate webbrowser to 0.8 [security] fix(deps): update rust crate webbrowser to 0.8 [security] - autoclosed Jul 24, 2024
@renovate renovate bot closed this Jul 24, 2024
@renovate renovate bot deleted the renovate/crate-webbrowser-vulnerability branch July 24, 2024 19:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants