dec55b7
Bump main to v4.17.23 (#6088)19c9251
fix: setCacheHas JSDoc return type should be boolean (#6071)b5e6729
jsdoc: Add -0 and BigInt zeros to _.compact falsey values list (#6062)edadd45
Prevent prototype pollution on baseUnset function4879a7a
doc: fix autoLink function, conversion of source links (#6056)9648f69
chore: remove yarn.lock file (#6053)dfa407d
ci: remove legacy configuration files (#6052)156e196
feat: add renovate setup (#6039)933e106
ci: add pipeline for Bun (#6023)072a807
docs: update links related to Open JS Foundation (#5968)Sourced from mdast-util-to-hast's releases.
13.2.1
Fix
- ab3a795 Fix support for spaces in class names
Types
- efb5312 Refactor to use
@imports- a5bc210 Add declaration maps
Full Changelog: https://github.com/syntax-tree/mdast-util-to-hast/compare/13.2.0...13.2.1
Sourced from node-forge's changelog.
1.3.3 - 2025-12-02
Fixed
- [pkcs12] Make digestAlgorithm parameters optional to fix PKCS#12/PFX issues introduced in 1.3.2.
1.3.2 - 2025-11-25
Security
- HIGH: ASN.1 Validator Desynchronization
- An Interpretation Conflict (CWE-436) vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures to desynchronize schema validations, yielding a semantic divergence that may bypass downstream cryptographic verifications and security decisions.
- Reported by Hunter Wodzenski.
- CVE ID: CVE-2025-12816
- GHSA ID: GHSA-5gfm-wpxj-wjgq
- HIGH: ASN.1 Unbounded Recursion
- An Uncontrolled Recursion (CWE-674) vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs.
- Reported by Hunter Wodzenski.
- CVE ID: CVE-2025-66031
- GHSA ID: GHSA-554w-wpv2-vw27
- MODERATE: ASN.1 OID Integer Truncation
- An Integer Overflow (CWE-190) vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions.
- Reported by Hunter Wodzenski.
- CVE ID: CVE-2025-66030
- GHSA ID: GHSA-65ch-62r8-g69g
Fixed
- [asn1] Fix for vulnerability identified by CVE-2025-12816 PKCS#12 MAC verification bypass due to missing macData enforcement and improper asn1.validate routine.
- [asn1] Add
fromDer()max recursion depth check.
- Add a
asn1.maxDepthglobal configurable maximum depth of 256.- Add a
asn1.fromDer()per-callmaxDepthoption.- NOTE: The default maximum is assumed to be higher than needed for valid data. If this assumption is false then this could be a breaking change. Please file an issue if there are use cases that need a higher maximum.
- NOTE: The per-call
maxDepthparameter has not been exposed up through all of the API stack due to the complexities involved. Please file an issue if there are use cases that require this instead of changing the default
... (truncated)
1cea0af
Release 1.3.3.5265989
Update changelog.e4f3961
Fix changelog for release.503979b
Update changelog.c3b3b32
Make digestAlgorithm parameters optional6f70043
Update CVE details.f547b0d
Start 1.3.3-0.235ad3e
Release 1.3.2.2598244
Update changelog.0032dd0
Fix typos.Sourced from qs's changelog.
6.14.1
- [Fix] ensure arrayLength applies to
[]notation as well- [Fix]
parse: when a custom decoder returnsnullfor a key, ignore that key- [Refactor]
parse: extract key segment splitting helper- [meta] add threat model
- [actions] add workflow permissions
- [Tests]
stringify: increase coverage- [Dev Deps] update
eslint,@ljharb/eslint-config,npmignore,es-value-fixtures,for-each,object-inspect6.14.0
- [New]
parse: addthrowOnParameterLimitExceededoption (#517)- [Refactor]
parse: useutils.combinemore- [patch]
parse: add explicitthrowOnLimitExceededdefault- [actions] use shared action; re-add finishers
- [meta] Fix changelog formatting bug
- [Deps] update
side-channel- [Dev Deps] update
es-value-fixtures,has-bigints,has-proto,has-symbols- [Tests] increase coverage
6.13.1
- [Fix]
stringify: avoid a crash when afilterkey isnull- [Fix]
utils.merge: functions should not be stringified into keys- [Fix]
parse: avoid a crash with interpretNumericEntities: true, comma: true, and iso charset- [Fix]
stringify: ensure a non-stringfilterdoes not crash- [Refactor] use
__proto__syntax instead ofObject.createfor null objects- [Refactor] misc cleanup
- [Tests]
utils.merge: add some coverage- [Tests] fix a test case
- [actions] split out node 10-20, and 20+
- [Dev Deps] update
es-value-fixtures,mock-property,object-inspect,tape
3fa11a5
v6.14.1a626704
[Dev Deps] update npmignore3086902
[Fix] ensure arrayLength applies to [] notation as
wellfc7930e
[Dev Deps] update eslint,
@ljharb/eslint-config0b06aac
[Dev Deps] update @ljharb/eslint-config64951f6
[Refactor] parse: extract key segment splitting helpere1bd259
[Dev Deps] update @ljharb/eslint-configf4b3d39
[eslint] add eslint 9 optional peer dep6e94d95
[Dev Deps] update eslint,
@ljharb/eslint-config, npmignore973dc3c
[actions] add workflow permissionsSourced from react-router's releases.
v7.13.0
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v7130
v7.12.0
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v7120
v7.11.0
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v7110
v7.10.1
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v7101
v7.10.0
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v7100
v7.9.6
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v796
v7.9.5
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v795
v7.9.4
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v794
v7.9.3
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v793
v7.9.2
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v792
v7.9.1
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v791
v7.9.0
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v790
v7.8.2
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v782
v7.8.1
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v781
v7.8.0
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v780
v7.7.1
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v771
v7.7.0
See the changelog for release notes: https://github.com/remix-run/react-router/blob/main/CHANGELOG.md#v770
... (truncated)
Sourced from react-router's changelog.
7.13.0
Minor Changes
- Add
crossOriginprop toLinkscomponent (#14687)Patch Changes
- Fix double slash normalization for useNavigate colon urls (#14718)
- Update failed origin checks to return a 400 status instead of a 500 (#14737)
- Bugfix #14666: Inline criticalCss is missing nonce (#14691)
- Loosen
allowedActionOriginsglob check so**matches all domains (#14722)7.12.0
Minor Changes
- Add additional layer of CSRF protection by rejecting submissions to UI routes from external origins. If you need to permit access to specific external origins, you can specify them in the
react-router.config.tsconfigallowedActionOriginsfield. (#14708)Patch Changes
Fix
generatePathwhen used with suffixed params (i.e., "/books/:id.json") (#14269)Export
UNSAFE_createMemoryHistoryandUNSAFE_createHashHistoryalongsideUNSAFE_createBrowserHistoryfor consistency. These are not intended to be used for new apps but intended to help apps usiongunstable_HistoryRoutermigrate from v6->v7 so they can adopt the newer APIs. (#14663)Escape HTML in scroll restoration keys (#14705)
Validate redirect locations (#14706)
[UNSTABLE] Pass
<Scripts nonce>value through to the underlyingimportmapscripttag when usingfuture.unstable_subResourceIntegrity(#14675)[UNSTABLE] Add a new
future.unstable_trailingSlashAwareDataRequestsflag to provide consistent behavior ofrequest.pathnameinsidemiddleware,loader, andactionfunctions on document and data requests when a trailing slash is present in the browser URL. (#14644)Currently, your HTTP and
requestpathnames would be as follows for/a/b/cand/a/b/c/
URL /a/b/cHTTP pathname requestpathname`Document /a/b/c/a/b/c✅Data /a/b/c.data/a/b/c✅
URL /a/b/c/HTTP pathname requestpathname`Document /a/b/c//a/b/c/✅Data /a/b/c.data/a/b/c⚠️With this flag enabled, these pathnames will be made consistent though a new
_.dataformat for client-side.datarequests:
URL /a/b/cHTTP pathname requestpathname`Document /a/b/c/a/b/c✅
... (truncated)
5557ba3
chore: Update version for release (#14749)62c6e0e
chore: Update version for release (pre) (#14738)3126264
Return 400 response on failed origin checks (#14737)3a5b5ad
Fix double slash normalization for useNavigate paths with
colons (#14718)f29c6c9
Add docs and loosen origins wildcard check (#14722)0bb972b
fix(react-router/dom/ssr): add nonce to inline critical css
(#14691)dd08f8d
fix(react-router): add crossOrigin prop to Links component (#14687)c38d76c
chore: format26653a6
chore: Update version for release (#14712)7ac2346
chore: Update version for release (pre) (#14709)This version was pushed to npm by [GitHub Actions](https://www.npmjs.com/~GitHub Actions), a new releaser for react-router since your current version.