fix: patch security vulnerabilities in next and diff #8488
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description of changes:
This PR addresses two critical security vulnerabilities identified by Dependabot:
Next.js CVE-2025-67779: Upgraded
nextfrom 14.2.32 to 14.2.35 to fix an incomplete patch for a Denial of Service vulnerability in React Server Components. This vulnerability allowed malicious HTTP requests to cause infinite loops in the server runtime.jsdiff DoS vulnerability: Added
diffresolution to force version 8.0.3 to patch a Denial of Service vulnerability where parsing patches with certain line break characters (\r,\u2028,\u2029) could cause infinite loops and memory exhaustion. Sincediffis a transitive dependency pulled in byts-node, and even the latest version ofts-node(10.9.2) still depends on the vulnerablediff^4.0.1, a Yarn resolution was required to override all instances of the vulnerable version and force upgrade to the secure 8.0.3 release.Related GitHub issue #, if available:
Instructions
If this PR should not be merged upon approval for any reason, please submit as a DRAFT
Which product(s) are affected by this PR (if applicable)?
Which platform(s) are affected by this PR (if applicable)?
Please add the product(s)/platform(s) affected to the PR title
Checks
ref: MDX:
[link](https://docs.amplify.aws/)HTML:<a href="https://docs.amplify.aws/">link</a>When this PR is ready to merge, please check the box below
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.