From 315480824bc65253aa58dffbaf2fec8641d4bf8d Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Peter=20St=C3=B6ckli?=
Date: Tue, 22 Nov 2022 11:25:10 +0100
Subject: [PATCH] Fix KernelOpen qhelp
---
ruby/ql/src/queries/security/cwe-078/KernelOpen.inc.qhelp | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ruby/ql/src/queries/security/cwe-078/KernelOpen.inc.qhelp b/ruby/ql/src/queries/security/cwe-078/KernelOpen.inc.qhelp
index add02f20bf3..2c220ba7aea 100644
--- a/ruby/ql/src/queries/security/cwe-078/KernelOpen.inc.qhelp
+++ b/ruby/ql/src/queries/security/cwe-078/KernelOpen.inc.qhelp
@@ -18,7 +18,7 @@ The same vulnerability applies to IO.read, IO.write,
does not have this vulnerability. Similarly, use the methods from the File
class instead of the IO class e.g. File.read instead
of IO.read.
-Instead of URI.open use URI().open or an HTTP Client.
+Instead of URI.open use URI(..).open or an HTTP Client.