Skip to content

Bump software.amazon.awssdk:netty-nio-client to resolve security vulnerability CVE‑2025‑6735 #4529

@mssowjuv

Description

@mssowjuv

Describe the bug
Through the software.amazon.awssdk:netty-nio-client dependency, any project using our current AWS SDK stack (e.g., software.amazon.awssdk:sts) transitively pulls in io.netty:netty-codec-http. The version of netty-codec-http dragged in by
netty-nio-client today is still below the fixed 4.1.129.Final release, so every service that depends on this AWS client inherits CVE‑2025‑6735, which vulnerability scanners are already flagging. Amazon hasn’t yet cut a new SDK release with a
patched Netty, but the Netty project has already shipped 4.1.130.Final, which contains the fix. I’m raising this issue to ask that we bump the AWS Netty transport—or the Netty overrides we apply in our build—to 4.1.130.Final and publish a new
minor version so downstream apps can consume the patched dependency.
Client Version
25.0.0

Kubernetes Version
e.g. 1.19.3

Java Version
e.g. Java 8

To Reproduce
Steps to reproduce the behavior:

Expected behavior
A clear and concise description of what you expected to happen.

KubeConfig
If applicable, add a KubeConfig file with secrets redacted.

Server (please complete the following information):

  • OS: [e.g. Linux]
  • Environment [e.g. container]
  • Cloud [e.g. Azure]

Additional context
Add any other context about the problem here.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions