Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump next from 14.2.14 to 15.1.0 #4679

Closed
wants to merge 1 commit into from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Dec 13, 2024

Bumps next from 14.2.14 to 15.1.0.

Release notes

Sourced from next's releases.

v15.1.0

Core Changes

  • fix: decrypt bound args before generating a cache key: #72463
  • Fix the path to the next/experimental/testing/server export: #72527
  • Expand server-source-maps scenarios to cover Edge runtime: #72288
  • Ensure logged errors in Edge runtime include the stack: #72394
  • fix: added cache control headers for static app routes: #72521
  • capture console issues as console errors: #72468
  • Add expireTag and expirePath APIs: #72485
  • fix: try/catch access to localStorage within __NEXT_APP_ISR_INDICATOR useEffect: #72362
  • Move client build ID to a global variable: #72592
  • refactor(turbopack): Remove swc_css: #72602
  • Bypass source map dev middleware for client chunks: #72581
  • chore: remove rc from URL: #72599
  • improve no-img-element lint error message: #72410
  • Combine bound "use cache" closure args into a single parameter: #72587
  • [Turbopack] add BackendOptions and allow to disable dependencies, children and storage: #72426
  • Omit unused args when calling "use cache" functions: #72506
  • Add experimental clientSegmentCache flag: #72626
  • Add compiler.define option: #71802
  • Fix static indicator with dynamicIO: #72631
  • Allow usage of Node.js prereleases: #72635
  • improved network url in (dev) cli: #72634
  • chore: update getting-started/react-essentials path: #72250
  • Fix static indicator for pure IO case: #72639
  • Bump the monorepo packages TypeScript to 5.6.3: #72625
  • Bump @capsizecss/metrics to 3.4.0 for Geist Google Font: #72746
  • refactor: remove unused asNotFound property: #72585
  • Remove unused enabled config from server actions transforms: #72755
  • Ensure Next.js is ignore-listed when used as external: #72498
  • Bump eslint-plugin-react to 7.37.0: #72759
  • upgrade amphtml-validator to 1.0.38: #72645
  • fix multi-level redirect in server actions: #72770
  • refactor: rename error boundary not-found to http-error-fallback: #72586
  • Upgrade React from 5c56b873-20241107 to 7ac8e612-20241113: #72768
  • Re-use randomly selected dev server port for automatic restarts: #72771
  • Emit build error when "use cache" is used without dynamicIO enabled: #72781
  • fix: not found bounary prop: #72784
  • silence sass legacy-js-api warning: #72632
  • [Segment Prefetch] Move access token to route tree: #72775
  • Add internal affordances to show ignore-listed stackframes in terminal: #72763
  • chore(turbopack): Centralize reqwest TLS feature configs in turbo-tasks-fetch: #72526
  • Upgrade React from 7ac8e612-20241113 to 380f5d67-20241113: #72819
  • Shorten unsourcemapped absolute locations in terminal stacktraces: #72764
  • codemod: replace revalidate(Tag|Path) to expire(Tag|Path): #72826
  • "Fix": Lift type check out of loop: #72840
  • hide stack trace in CanaryOnlyError: #72859
  • Allow missing CacheNodeSeedData during prefetch: #72857
  • Add Segment Cache feature check to prefetch API: #72861

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [next](https://github.com/vercel/next.js) from 14.2.14 to 15.1.0.
- [Release notes](https://github.com/vercel/next.js/releases)
- [Changelog](https://github.com/vercel/next.js/blob/canary/release.js)
- [Commits](vercel/next.js@v14.2.14...v15.1.0)

---
updated-dependencies:
- dependency-name: next
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Dec 13, 2024
Copy link

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@dependabot merge

Copy link
Contributor Author

dependabot bot commented on behalf of github Dec 13, 2024

Sorry, only users with push access can use that command.

"node_modules/sprintf-js": {
"version": "1.0.3",
"resolved": "https://registry.npmjs.org/sprintf-js/-/sprintf-js-1.0.3.tgz",
"integrity": "sha512-D9cPgkvLlV3t3IzL0D0YLvGA9Ahk4PcvVwUbN0dSGr1aP0Nrt4AEnTUbuGvquEC0mA64Gqt1fzirlRs5ibXx8g==",
"license": "BSD-3-Clause"
},
"node_modules/ssh2": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2020-26301: nodejs-ssh2: Command injection by calling vulnerable method with untrusted input) (update to 1.4.0)

The issue identified by the Trivy linter is related to a security vulnerability in the ssh2 package version 0.8.9. Specifically, this version has a known command injection vulnerability (CVE-2020-26301) that can occur when untrusted input is passed to certain methods. This can potentially allow an attacker to execute arbitrary commands on the server.

To resolve this issue, you should update the ssh2 package to a safer version, specifically to version 1.4.0 or later, which contains fixes for this vulnerability.

Here’s the code suggestion to update the dependency:

    "node_modules/ssh2": {
      "version": "1.4.0",

This comment was generated by an experimental AI tool.

@@ -58379,6 +67765,16 @@
"node": ">=4.0.0"
}
},
"node_modules/vue-template-compiler": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Codacy found a medium Security issue: Insecure dependency [email protected] (CVE-2024-6783: vue-template-compiler vulnerable to client-side Cross-Site Scripting (XSS)) (update to 3.0.0)

The issue identified by the Trivy linter pertains to a security vulnerability in the vue-template-compiler package, specifically version 2.6.12. This version is susceptible to a Cross-Site Scripting (XSS) attack, which can allow an attacker to execute arbitrary scripts in the context of the user's session. The recommended action is to update this package to a more secure version that has addressed this vulnerability.

To fix the issue, you should update the vue-template-compiler dependency to version 3.0.0 or later, as suggested by the CVE report.

Here is the code suggestion to make this change:

    "node_modules/vue-template-compiler": {
      "version": "3.0.0",

This single line change updates the version of vue-template-compiler to 3.0.0, which should resolve the security vulnerability.


This comment was generated by an experimental AI tool.

"integrity": "sha512-GpVkmM8vF2vQUkj2LvZmD35JxeJOLCwJ9cUkugyk2nuhbv3+mJvpLYYt+0+USMxE+oj+ey/lJEnhZw75x/OMcQ==",
"peer": true
},
"node_modules/moment": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2022-24785: Moment.js: Path traversal in moment.locale) (update to 2.29.2)

The issue identified by the Trivy linter pertains to a security vulnerability in the Moment.js library, specifically version 2.29.1. This vulnerability, tracked as CVE-2022-24785, involves a path traversal flaw that could potentially allow an attacker to access files outside of the intended directory structure when using the moment.locale method.

To address this security issue, the recommended action is to update the Moment.js dependency to a secure version, specifically 2.29.2 or later, which has patched this vulnerability.

Here’s the single line change you can make to update the version of Moment.js in your package configuration:

Suggested change
"node_modules/moment": {
"node_modules/moment": { "version": "2.29.2", ...

This change updates the version of Moment.js to 2.29.2, mitigating the identified security risk.


This comment was generated by an experimental AI tool.

@@ -44899,6 +51155,146 @@
"node": ">=10"
}
},
"node_modules/mockery": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2022-37614: mockery is vulnerable to prototype pollution) (update to )

The issue identified by the Trivy linter pertains to the mockery package version 2.1.0, which is vulnerable to prototype pollution as noted in CVE-2022-37614. Prototype pollution is a security vulnerability that allows an attacker to manipulate an object's prototype, potentially leading to unexpected behavior or security breaches in applications that rely on that object.

To resolve this vulnerability, you should update the mockery package to a version that is not affected by this security issue. The latest version of the package should ideally be used, as it will contain the necessary fixes.

Here's the code suggestion to fix the issue by updating the mockery version:

    "node_modules/mockery": {
      "version": "2.1.1",
      "resolved": "https://registry.npmjs.org/mockery/-/mockery-2.1.1.tgz",
      "integrity": "sha512-<new-integrity-hash>",
      "peer": true

Note: Ensure to replace <new-integrity-hash> with the actual integrity hash of the updated version if you are maintaining an integrity check.


This comment was generated by an experimental AI tool.

@@ -36079,6 +41780,12 @@
"url": "https://github.com/sindresorhus/invert-kv?sponsor=1"
}
},
"node_modules/ip": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2023-42282: nodejs-ip: arbitrary code execution via the isPublic() function) (update to 2.0.1, 1.1.9)

The issue identified by the Trivy linter is related to a security vulnerability in the ip package, specifically version 1.1.5. The vulnerability (CVE-2023-42282) allows for arbitrary code execution through the isPublic() function. To mitigate this risk, it is recommended to update the ip package to a secure version, either 2.0.1 or 1.1.9, which have addressed this security flaw.

To fix the issue, you can update the version of the ip package in your package.json file. Here’s the suggested change:

    "node_modules/ip": {
      "version": "1.1.9",
      ...
    }

Alternatively, if you want to upgrade to the latest major version, you could specify:

    "node_modules/ip": {
      "version": "2.0.1",
      ...
    }

Make sure to run npm install after making this change to update the package.


This comment was generated by an experimental AI tool.

@@ -57672,6 +66891,112 @@
"integrity": "sha512-x00IRNXNy63jwGkJmzPigoySHbaqpNuzKbBOmzK+g2OdZpQ9w+sxCN+VSB3ja7IAge2OP2qpfxTjeNcyjmW1uw==",
"license": "ISC"
},
"node_modules/utile": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ℹ️ Codacy found a minor Security issue: Insecure dependency [email protected] (NSWG-ECO-445: Out-of-bounds Read) (no fix available)

The issue reported by the Trivy linter indicates that the utile package version 0.3.0 has a known security vulnerability classified as an "Out-of-bounds Read." This vulnerability can potentially allow an attacker to read sensitive data from memory outside the bounds of allocated buffers, which could lead to information disclosure or other security risks. Since there is no fix available for this specific version, it is advisable to remove or replace this insecure dependency.

To address this issue, you can remove the utile package from your project. This can be done by modifying the package.json file to ensure that the package is no longer included in your project.

Here’s the single line change to remove the utile package:

Suggested change
"node_modules/utile": {
"node_modules/utile": null,

This change effectively removes the utile dependency from the project's dependency tree. You may also want to consider finding an alternative package that provides similar functionality without the security issues.


This comment was generated by an experimental AI tool.

"pjv": "bin/pjv"
}
},
"node_modules/package-json-validator/node_modules/minimist": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Codacy found a medium Security issue: Insecure dependency [email protected] (CVE-2020-7598: nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or proto payload) (update to 0.2.1)

The issue identified by the Trivy linter is related to a security vulnerability in the minimist package, specifically version 0.0.10. This version is affected by a prototype pollution vulnerability (CVE-2020-7598), which allows an attacker to manipulate properties of Object.prototype through malicious payloads. This can lead to unexpected behavior and security risks in applications that rely on this package.

To resolve this issue, you should update the minimist dependency to a secure version. The recommended version is 0.2.1 or higher, as it addresses the vulnerability.

Here's the code suggestion to fix the issue by updating the version of minimist:

Suggested change
"node_modules/package-json-validator/node_modules/minimist": {
"version": "0.2.1",

However, since this is a nested dependency, you may need to update the parent dependency (optimist in this case) to ensure it pulls in the updated version of minimist. If optimist does not support a higher version of minimist, you may need to consider alternatives or fork the package.


This comment was generated by an experimental AI tool.

@@ -35312,6 +40434,12 @@
"node": ">= 0.6"
}
},
"node_modules/http-cache-semantics": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2022-25881: http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability) (update to 4.1.1)

The issue identified by the Trivy linter is a security vulnerability in the http-cache-semantics package, specifically version 3.8.1. This vulnerability, designated as CVE-2022-25881, is a Regular Expression Denial of Service (ReDoS) issue, which can lead to performance degradation or service unavailability when an attacker exploits the vulnerability by sending specially crafted requests.

To resolve this security issue, you should update the http-cache-semantics package to version 4.1.1 or later, where the vulnerability has been addressed.

Here’s the single line change you can make to fix the issue:

Suggested change
"node_modules/http-cache-semantics": {
"node_modules/http-cache-semantics": { "version": "4.1.1", ...

Make sure to also run your package manager's install command (e.g., npm install or yarn install) to ensure the updated version is reflected in your node_modules directory.


This comment was generated by an experimental AI tool.

"pjv": "bin/pjv"
}
},
"node_modules/package-json-validator/node_modules/minimist": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2020-7598: nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or proto payload) (update to 0.2.1, 1.2.3)

The issue identified by the Trivy linter is related to a known vulnerability in the minimist package, specifically version 0.0.10. This vulnerability, outlined in CVE-2020-7598, allows for prototype pollution, which means that an attacker could potentially manipulate the properties of Object.prototype. This can lead to unexpected behavior and security risks within applications that rely on this package.

To resolve this issue, you should update the minimist dependency to a safer version, as suggested by the linter. The recommended versions are 0.2.1 or 1.2.3, which do not contain this vulnerability.

Here is the single line change you can make to fix the issue:

Suggested change
"node_modules/package-json-validator/node_modules/minimist": {
"node_modules/package-json-validator/node_modules/minimist": { "version": "1.2.3", ... }

Make sure to also update the package's lock file (e.g., package-lock.json or yarn.lock) accordingly, and run your package manager's install command to ensure the changes take effect.


This comment was generated by an experimental AI tool.

"object-assign": "^4.1.1"
}
},
"node_modules/@teambit/legacy/node_modules/semver": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2022-25883: nodejs-semver: Regular expression denial of service) (update to 7.5.2, 6.3.1, 5.7.2)

The issue identified by the Trivy linter pertains to a security vulnerability in the semver package version 7.3.4. The vulnerability, classified as CVE-2022-25883, relates to a Regular Expression Denial of Service (ReDoS) attack, which can be exploited to cause performance degradation or service outages by making the application consume excessive resources when processing certain inputs.

To mitigate this vulnerability, you should update the semver package to a version that is not affected by this issue. The recommended versions to upgrade to are 7.5.2, 6.3.1, or 5.7.2.

Here’s the single line change that should be made to update the semver dependency:

Suggested change
"node_modules/@teambit/legacy/node_modules/semver": {
"node_modules/@teambit/legacy/node_modules/semver": { "version": "7.5.2", ...

This change specifies that the semver package should use version 7.5.2, which is not affected by the identified vulnerability.


This comment was generated by an experimental AI tool.

@@ -36079,6 +41780,12 @@
"url": "https://github.com/sindresorhus/invert-kv?sponsor=1"
}
},
"node_modules/ip": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ℹ️ Codacy found a minor Security issue: Insecure dependency [email protected] (CVE-2023-42282: nodejs-ip: arbitrary code execution via the isPublic() function) (update to 1.1.9)

The issue identified by the Trivy linter pertains to a security vulnerability in the ip package version 1.1.5, specifically CVE-2023-42282. This vulnerability allows for arbitrary code execution through the isPublic() function in the package. To mitigate this risk, it is recommended to update the package to a secure version, in this case, version 1.1.9 or later.

To fix this issue, you can update the version of the ip package in your package.json file. Here’s the suggested code change:

    "node_modules/ip": {
      "version": "1.1.9",
      "resolved": "https://registry.npmjs.org/ip/-/ip-1.1.9.tgz",
      "integrity": "sha512-<new-integrity-hash>",
      "peer": true
    }

Make sure to replace <new-integrity-hash> with the actual integrity hash for version 1.1.9, which you can find from the npm registry or by running npm install [email protected] and checking the package-lock.json. After making this change, remember to run npm install to update your dependencies.


This comment was generated by an experimental AI tool.

"node": ">=10"
}
},
"node_modules/@teambit/legacy/node_modules/minimatch": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2022-3517: nodejs-minimatch: ReDoS via the braceExpand function) (update to 3.0.5)

The issue reported by the Trivy linter is related to a security vulnerability in the minimatch package, specifically version 3.0.4. This vulnerability (CVE-2022-3517) involves a Regular Expression Denial of Service (ReDoS) attack that can be exploited through the braceExpand function. It is recommended to upgrade to at least version 3.0.5, where the vulnerability has been addressed.

To resolve this issue, you can update the version of minimatch in your package.json or wherever the dependency is specified. The following code suggestion reflects this single line change:

Suggested change
"node_modules/@teambit/legacy/node_modules/minimatch": {
"node_modules/@teambit/legacy/node_modules/minimatch": { "version": "3.0.5", ...

Make sure to run npm install after making this change to update the dependency in your project.


This comment was generated by an experimental AI tool.

Copy link
Contributor Author

dependabot bot commented on behalf of github Dec 19, 2024

Superseded by #4684.

@dependabot dependabot bot closed this Dec 19, 2024
@dependabot dependabot bot deleted the dependabot/npm_and_yarn/next-15.1.0 branch December 19, 2024 07:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants