chore(deps): bump vite 7.3.1 → 7.3.2 (security patch)#44
Conversation
Bumps the npm_and_yarn group with 1 update in the / directory: [vite](https://github.com/vitejs/vite/tree/HEAD/packages/vite). Updates `vite` from 7.3.1 to 7.3.2 - [Release notes](https://github.com/vitejs/vite/releases) - [Changelog](https://github.com/vitejs/vite/blob/v7.3.2/packages/vite/CHANGELOG.md) - [Commits](https://github.com/vitejs/vite/commits/v7.3.2/packages/vite) --- updated-dependencies: - dependency-name: vite dependency-version: 7.3.2 dependency-type: direct:development dependency-group: npm_and_yarn ... Signed-off-by: dependabot[bot] <support@github.com>
There was a problem hiding this comment.
Pull request overview
This PR updates the project’s Vite dev dependency to the latest patch release, aligning the declared version range and lockfile resolution for the build/dev tooling.
Changes:
- Bumped
vitedevDependency to^7.3.2inpackage.json. - Updated
package-lock.jsonto resolvevite@7.3.2(including updated tarball URL and integrity hash).
Reviewed changes
Copilot reviewed 1 out of 2 changed files in this pull request and generated no comments.
| File | Description |
|---|---|
| package.json | Updates the Vite version range used by the project’s dev tooling. |
| package-lock.json | Locks Vite to 7.3.2 and updates resolved metadata for reproducible installs. |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
|
@copilot Please looker over issues, comments and reccomended sugestionz snd aplly them as you see fit in relation to the repo snd its state |
Reviewed the repo state:
No additional changes are needed — the PR is clean and ready to merge. |
Vite 7.3.2 is a security patch release fixing three filesystem-related vulnerabilities in the dev server.
Changes
package.json— updatedvitedevDependency range to^7.3.2package-lock.json— lockfile resolved tovite@7.3.2with updated tarball integrity hashSecurity fixes included
server.fscheck bypass on env transport requests (#22162)server.fscheck not applied after query string stripping (#22160)