-
-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(deps): update dependency next to v14.2.21 [security] #478
base: dev
Are you sure you want to change the base?
Conversation
The latest updates on your projects. Learn more about Vercel for Git ↗︎
|
Important Review skippedBot user detected. To trigger a single review, invoke the You can disable this status message by setting the Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media? 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
CodeRabbit Configuration File (
|
#704 Bundle Size — 18.76MiB (~+0.01%).4c50b73(current) vs e0a1f6e dev#406(baseline) Bundle metrics
|
Current #704 |
Baseline #406 |
|
---|---|---|
Initial JS | 1005.83KiB (~+0.01% ) |
1005.73KiB |
Initial CSS | 6.87KiB (+3.92% ) |
6.61KiB |
Cache Invalidation | 2.86% |
4.43% |
Chunks | 20 |
20 |
Assets | 80 |
80 |
Modules | 792 |
792 |
Duplicate Modules | 103 |
103 |
Duplicate Code | 5.65% (-0.18% ) |
5.66% |
Packages | 81 |
81 |
Duplicate Packages | 0 |
0 |
Bundle size by type 5 changes
5 regressions
Current #704 |
Baseline #406 |
|
---|---|---|
IMG | 17.47MiB (+100% ) |
undefined |
JS | 1.09MiB (+100% ) |
undefined |
Fonts | 189.64KiB (+100% ) |
undefined |
CSS | 6.87KiB (+100% ) |
undefined |
Other | 4.07KiB (+100% ) |
undefined |
Bundle analysis report Branch renovate/npm-next-vulnerability Project dashboard
Generated by RelativeCI Documentation Report issue
51a9b6f
to
ac581e5
Compare
ac581e5
to
8555cba
Compare
8555cba
to
a6abf2d
Compare
a6abf2d
to
4c50b73
Compare
Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
4c50b73
to
a36d577
Compare
|
Quality Gate passedIssues Measures |
This PR contains the following updates:
14.2.13
->14.2.21
Next.js authorization bypass vulnerability
CVE-2024-51479 / GHSA-7gfc-8cq8-jh5f
More information
Details
Impact
If a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed.
Patches
This issue was patched in Next.js
14.2.15
and later.If your Next.js application is hosted on Vercel, this vulnerability has been automatically mitigated, regardless of Next.js version.
Workarounds
There are no official workarounds for this vulnerability.
Credits
We'd like to thank tyage (GMO CyberSecurity by IERAE) for responsible disclosure of this issue.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Next.js Allows a Denial of Service (DoS) with Server Actions
CVE-2024-56332 / GHSA-7m27-7ghc-44w9
More information
Details
Impact
A Denial of Service (DoS) attack allows attackers to construct requests that leaves requests to Server Actions hanging until the hosting provider cancels the function execution.
Note: Next.js server is idle during that time and only keeps the connection open. CPU and memory footprint are low during that time.
Deployments without any protection against long running Server Action invocations are especially vulnerable. Hosting providers like Vercel or Netlify set a default maximum duration on function execution to reduce the risk of excessive billing.
This is the same issue as if the incoming HTTP request has an invalid
Content-Length
header or never closes. If the host has no other mitigations to those then this vulnerability is novel.This vulnerability affects only Next.js deployments using Server Actions.
Patches
This vulnerability was resolved in Next.js 14.2.21, 15.1.2, and 13.5.8. We recommend that users upgrade to a safe version.
Workarounds
There are no official workarounds for this vulnerability.
Credits
Thanks to the PackDraw team for responsibly disclosing this vulnerability.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
vercel/next.js (next)
v14.2.21
Compare Source
v14.2.20
Compare Source
v14.2.19
Compare Source
Core Changes
Misc Changes
Credits
Huge thanks to @ztanner and @ijjk for helping!
v14.2.18
Compare Source
v14.2.17
Compare Source
v14.2.16
Compare Source
v14.2.15
Compare Source
Core Changes
Credits
Huge thanks to @ztanner, @agadzik, @huozhi, @styfle, @icyJoseph and @wyattjoh for helping!
v14.2.14
Compare Source
Core Changes
Credits
Huge thanks to @styfle, @ztanner, @ijjk, @huozhi and @wyattjoh for helping!
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.