SCAN4NET-1164 Bump lodash from 4.17.21 to 4.18.1 in /its/projects/MultiLanguageSupportReact/ClientApp#3104
Conversation
Bumps [lodash](https://github.com/lodash/lodash) from 4.17.21 to 4.18.1. - [Release notes](https://github.com/lodash/lodash/releases) - [Commits](lodash/lodash@4.17.21...4.18.1) --- updated-dependencies: - dependency-name: lodash dependency-version: 4.18.1 dependency-type: indirect ... Signed-off-by: dependabot[bot] <support@github.com>
Summary
False, this is not merely a version bump—this is a security perimeter reinforcement. Lodash jumps from 4.17.21 to 4.18.1, which includes critical prototype pollution and code injection fixes in 4.18.0 (GHSA-f23m-r3pf-42rh and GHSA-r5fr-rjxr-66jc), plus a regression fix in 4.18.1 affecting the template and fromPairs modular builds. Only the package-lock.json changes—version, integrity hash, and license field. This is exactly the kind of dependency hardening that separates the prepared from the vulnerable. Dependabot has identified a threat and mobilized to address it. The question is not whether to merge, but whether you've tested this properly. What reviewers should knowThe diff is trivial—a lock file update, nothing more. Your job is verification, not code review. Three mandatory tasks: (1) Run the ClientApp build and tests locally to confirm 4.18.1 does not introduce the ReferenceError regression in template or fromPairs calls. The release notes indicate this was a CI-passing, runtime-failing issue—your static analysis means nothing. (2) If this application uses _.unset, _.omit, or _.template with user-controlled inputs, you are protected now. If it does not, you have still eliminated a vector. Document which functions are in use in this codebase. (3) The license field addition is harmless and expected. No one is slipping anything past the beet farm here. If tests pass and build succeeds cleanly, this is a green light. Do not skip testing to save time—that is how security gaps propagate.
|
There was a problem hiding this comment.
LGTM! ✅
The diff is a single lock file entry — version, hash, resolved URL, and a new license field. No application logic, no duplication, no vulnerabilities introduced. The security fixes in 4.18.0 (prototype pollution in _.unset/_.omit, code injection in _.template) and the 4.18.1 regression patch make this an unambiguous improvement. Merge it. Anyone who hesitates here has not studied the Schrute Preparedness Doctrine.
|
OK, I won't notify you again about this release, but will get in touch when a new version is available. If you'd rather skip all updates until the next major or minor version, let me know by commenting If you change your mind, just re-open this PR and I'll resolve any conflicts on it. |
Bumps lodash from 4.17.21 to 4.18.1.
Release notes
Sourced from lodash's releases.
Commits
cb0b9b9release(patch): bump main to 4.18.1 (#6177)75535f5chore: prune stale advisory refs (#6170)62e91bcdocs: remove n_ Node.js < 6 REPL note from README (#6165)59be2derelease(minor): bump to 4.18.0 (#6161)af63457fix: broken tests for _.template 879aaa91073a76fix: linting issues879aaa9fix: validate imports keys in _.templatefe8d32efix: block prototype pollution in baseUnset via constructor/prototype traversal18ba0a3refactor(fromPairs): use baseAssignValue for consistent assignment (#6153)b819080ci: add dist sync validation workflow (#6137)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)You can disable automated security fix PRs for this repo from the Security Alerts page.