chore(deps): update dependency hono to v4.12.18#256
Open
renovate[bot] wants to merge 1 commit into
Open
Conversation
c9c00e4 to
10755fd
Compare
10755fd to
c0e4287
Compare
6b9a9d1 to
29cb5c1
Compare
29cb5c1 to
781107f
Compare
781107f to
5a4607f
Compare
5a4607f to
6fa01c5
Compare
6fa01c5 to
56e33ef
Compare
56e33ef to
84d3442
Compare
84d3442 to
0dcc9e4
Compare
0dcc9e4 to
26944c7
Compare
26944c7 to
3d6076c
Compare
3d6076c to
0d8d4bd
Compare
bc158d9 to
ccd429a
Compare
ccd429a to
c646e56
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.12.14→4.12.18Release Notes
honojs/hono (hono)
v4.12.18Compare Source
v4.12.17Compare Source
v4.12.16Compare Source
Security fixes
This release includes fixes for the following security issues:
Unvalidated JSX Tag Names in hono/jsx May Allow HTML Injection
Affects: hono/jsx. Fixes missing validation of JSX tag names when using
jsx()orcreateElement(), which could allow HTML injection if untrusted input is used as the tag name. GHSA-69xw-7hcm-h432bodyLimit() can be bypassed for chunked / unknown-length requests
Affects: Body Limit Middleware. Fixes late enforcement for request bodies without a reliable Content-Length (e.g. chunked requests), where oversized requests could reach handlers and return successful responses before being rejected. GHSA-9vqf-7f2p-gf9v
v4.12.15Compare Source
What's Changed
New Contributors
Full Changelog: honojs/hono@v4.12.14...v4.12.15
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.