Ruby on Rails
Wednesday, April 3, 2019
As outlined in https://snyk.io/blog/malicious-remote-code-execution-backdoor-discovered-in-the-popular-bootstrap-sass-ruby-gem/
TLDR
If you use bootstrap-sass version 3.2.0.3, just do bundle update bootstrap-sass and you're good to go
--
-------------------------------------------------------------
visit my blog at http://jimlabs.herokuapp.com
visit my blog at http://jimlabs.herokuapp.com
You received this message because you are subscribed to the Google Groups "Ruby on Rails: Talk" group.
To unsubscribe from this group and stop receiving emails from it, send an email to rubyonrails-talk+unsubscribe@googlegroups.com.
To post to this group, send email to rubyonrails-talk@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/rubyonrails-talk/CAJ8y7Vd3pVKeLtnmXvBbAWqSTfUz8c3wwL91eCN%2BCHpcnNFZGQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment