[Snyk] Security upgrade next from 15.3.0 to 15.3.8#14
Open
m1981 wants to merge 1 commit into
Open
Conversation
The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-JS-NEXT-14400636 - https://snyk.io/vuln/SNYK-JS-NEXT-14400644
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
There was a problem hiding this comment.
Important
Looks good to me! 👍
Reviewed everything up to c8f8c27 in 26 seconds. Click for details.
- Reviewed
13lines of code in1files - Skipped
0files when reviewing. - Skipped posting
1draft comments. View those below. - Modify your settings and rules to customize what types of comments Ellipsis leaves. And don't forget to react with 👍 or 👎 to teach Ellipsis.
1. package.json:88
- Draft comment:
Bump Next.js from ^15.3.0 to ^15.3.8 to address known vulnerabilities (SNYK-JS-NEXT-14400636 & SNYK-JS-NEXT-14400644). Ensure no regressions occur. - Reason this comment was not posted:
Comment did not seem useful. Confidence is useful =0%<= threshold50%This comment is about a dependency change, specifically bumping the version of Next.js. It mentions addressing known vulnerabilities, which is informative, and asks to ensure no regressions occur, which is not allowed. Therefore, this comment should be removed.
Workflow ID: wflow_rHSLL0GMIAyVHAda
You can customize by changing your verbosity settings, reacting with 👍 or 👎, replying to comments, or adding code review rules.
| "mermaid": "^11.4.1", | ||
| "minimatch": "^5.1.0", | ||
| "next": "^15.3.0", | ||
| "next": "^15.3.8", |
There was a problem hiding this comment.
Since this repo commits pnpm-lock.yaml, changing the next semver range in package.json alone may not update what CI/deployments actually install (the lockfile can keep resolving to the old version). Consider updating the lockfile in this PR so the patched Next.js version is guaranteed to be used and the vulnerabilities are actually remediated.
🤖 Was this useful? React with 👍 or 👎
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Snyk has created this PR to fix 2 vulnerabilities in the npm dependencies of this project.
Snyk changed the following file(s):
package.jsonVulnerabilities that will be fixed with an upgrade:
SNYK-JS-NEXT-14400636
SNYK-JS-NEXT-14400644
Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Deserialization of Untrusted Data
Important
Upgrade
nextto 15.3.8 inpackage.jsonto fix security vulnerabilities.nextfrom 15.3.0 to 15.3.8 inpackage.jsonto fix vulnerabilities.This description was created by
for c8f8c27. You can customize this summary. It will automatically update as commits are pushed.