Open renovate[bot] opened 11 months ago
Name | Link |
---|---|
Latest commit | 4ee2d84e94193c385868accbad8f451234005c5f |
Latest deploy log | https://app.netlify.com/sites/hussainsark/deploys/65569f062a871f0008af8d13 |
Deploy Preview | https://deploy-preview-112--hussainsark.netlify.app |
Preview on mobile | Toggle QR Code...Use your smartphone camera to open QR code link. |
To edit notification comments on pull requests, go to your Netlify site configuration.
This PR contains the following updates:
0.32.4
->0.32.6
GitHub Vulnerability Alerts
GHSA-54xq-cgqr-rpm3
Overview
sharp uses libwebp to decode WebP images and versions prior to the latest 0.32.6 are vulnerable to the high severity https://github.com/advisories/GHSA-j7hp-h8jx-5ppr.
Who does this affect?
Almost anyone processing untrusted input with versions of sharp prior to 0.32.6.
How to resolve this?
Using prebuilt binaries provided by sharp?
Most people rely on the prebuilt binaries provided by sharp.
Please upgrade sharp to the latest 0.32.6, which provides libwebp 1.3.2.
Using a globally-installed libvips?
Please ensure you are using the latest libwebp 1.3.2.
Possible workaround
Add the following to your code to prevent sharp from decoding WebP images.
Release Notes
lovell/sharp (sharp)
### [`v0.32.6`](https://redirect.github.com/lovell/sharp/compare/v0.32.5...v0.32.6) [Compare Source](https://redirect.github.com/lovell/sharp/compare/v0.32.5...v0.32.6) ### [`v0.32.5`](https://redirect.github.com/lovell/sharp/compare/v0.32.4...v0.32.5) [Compare Source](https://redirect.github.com/lovell/sharp/compare/v0.32.4...v0.32.5)Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.