FRONTEND
Next.js v16.2.4
RESUMEN
> [!NOTE] > This release is backporting bug fixes. It does not include all pending features/changes on canary. Core Changes - chore: Bump reqwest to 0.13.2 (Fixes Google Fonts with Turbopack for Windows on ARM64) - Turbopack: fix filesystem watcher config not applying follow
Descripción Detallada
> [!NOTE] > This release is backporting bug fixes. It does not include all pending features/changes on canary. Core Changes - chore: Bump reqwest to 0.13.2 (Fixes Google Fonts with Turbopack for Windows on ARM64) - Turbopack: fix filesystem watcher config not applying followsymlinks(false) - Scope Safari ?ts= cache-buster to CSS/font assets only (Pages Router) - Compiler: Support boolean and number primtives in next.config defines - turbo-tasks: Fix recomputation loop by allowing cell cleanup on error during recomputation - Turbopack: shorter error for ChunkGroupInfo::getindexof - Turbopack: shorter error message for ModuleBatchesGraph::getentry_index - Adding more system info to the 'initialize project' trace Credits Huge thanks to @Badbird5907, @lukesandberg, @andrewimm, @sokra, and @mischnic for helping!
Esta versión corrige errores y mejora la compatibilidad con Google Fonts en Windows ARM64.
- Actualiza reqwest a 0.13.2 para arreglar Google Fonts con Turbopack en Windows ARM64.
- Corrige la configuración del watcher de archivos en Turbopack.
- Soporta primitivos booleanos y numéricos en next.config.
- Agrega más información del sistema al trazo de 'inicializar proyecto'.
A quién le importa
Todos los que usan Next.js y Turbopack en Windows ARM64.
Generado por IA · puede contener errores
Releases Relacionados
FRONTEND
Next.js v16.3.0
### Core Changes - fix(next/image): ensure `images.maximumResponseBody` applies to local images too: #92920 - Refactor trace server sort to SortMode enum (execution order / value / name): #92873 - Perf: Simplify static metadata handling: #92630 - remove flag guarding `unstable_io`: #92923 ### Misc
FRONTEND
Next.js v15.5.15
Please refer the following changelogs for more information about this security release: https://vercel.com/changelog/summary-of-cve-2026-23869