fix(security): bump netty-bom 4.1.132.Final → 4.1.133.Final (4 HIGH CVEs)#27981
Open
sonika-shah wants to merge 2 commits intomainfrom
Open
fix(security): bump netty-bom 4.1.132.Final → 4.1.133.Final (4 HIGH CVEs)#27981sonika-shah wants to merge 2 commits intomainfrom
sonika-shah wants to merge 2 commits intomainfrom
Conversation
Resolves 4 HIGH-severity Snyk findings (May 8 2026 scan against 1.13 image): - io.netty:netty-codec-http2 — Improper Handling of Highly Compressed Data (Data Amplification, br/zstd/snappy) - io.netty:netty-codec-dns — Null Byte Interaction Error (Poison Null Byte) - io.netty:netty-codec — Allocation of Resources Without Limits or Throttling (Lz4FrameDecoder) - io.netty:netty-codec — Improper Handling of Highly Compressed Data (Data Amplification) All four are fixed in netty 4.1.133.Final per the upstream advisories. A single bump on the netty-bom import propagates the version to every netty artifact pulled in transitively. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Contributor
There was a problem hiding this comment.
Pull request overview
Updates the root Maven dependency management to import io.netty:netty-bom 4.1.133.Final, ensuring all Netty artifacts resolve to the patched version across the build to address reported HIGH-severity CVEs.
Changes:
- Bump
io.netty:netty-bomfrom 4.1.132.Final → 4.1.133.Final in the rootpom.xmldependency management import.
3 tasks
yan-3005
approved these changes
May 8, 2026
Contributor
🔴 Playwright Results — 1 failure(s), 13 flaky✅ 4014 passed · ❌ 1 failed · 🟡 13 flaky · ⏭️ 86 skipped
Genuine Failures (failed on all attempts)❌
|
Code Review ✅ ApprovedBumps OptionsDisplay: compact → Showing less information. Comment with these commands to change:
Was this helpful? React with 👍 / 👎 | Gitar |
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.



Summary
Bumps
io.netty:netty-bomfrom 4.1.132.Final → 4.1.133.Final to resolve four HIGH-severity Snyk findings observed in the May 8 2026 scan of the 1.13 image. A single bump on the netty-bom import propagates the version to every netty artifact pulled in transitively (codec, codec-http2, codec-dns, etc.), so this one-line change retires all four CVEs.Vulnerabilities resolved
io.netty:netty-codec-http2HttpContentDecompressor/DelegatingDecompressorFrameListeneracceptbr/zstd/snappypayloads that bypass the configured decompression limit (data amplification → DoS)io.netty:netty-codec-dnsencodeDomainName/decodeDomainNameinadequately validate domain-label lengths, enabling DNS cache poisoning, domain validation bypass, and excessive memory allocationio.netty:netty-codecLz4FrameDecoderover-allocates on crafted compressed frames with manipulated header fields (resource exhaustion → DoS)io.netty:netty-codecAll four are fixed in
4.1.133.Final(Snyk-recommended remediation: "Upgradeio.netty:netty-*to 4.1.133.Final or higher").Why this is needed on
mainThe May 8 Snyk report against the 1.13 OSS image flagged 9 vulnerable dependency paths. The previous security cherry-pick (#27940 → 1.13 commit
4c1ec72) covered jetty-http, BouncyCastle, postgresql, jackson, spring, gson, httpcore5-h2 and commons-compress — but did not touch netty.mainis also still on4.1.132.Final, so this gap exists here as well; the bump has to land onmainfirst before it can be cherry-picked into 1.13.x.Other findings from the same Snyk report (tracked separately, not in this PR)
org.eclipse.jetty:jetty-http@12.1.6— already fixed onmainvia Dependabot Chore(deps): Bump org.eclipse.jetty:jetty-http from 12.1.6 to 12.1.7 in /openmetadata-service #27372 (/openmetadata-service) and Chore(deps): Bump org.eclipse.jetty:jetty-http from 12.1.6 to 12.1.7 in /openmetadata-mcp #27373 (/openmetadata-mcp). Cherry-picked to 1.13 in fix(security): bump jetty-http 12.1.6 → 12.1.7 + pac4j-core 5.7.0 → 5.7.10 (1.13) #27980.org.pac4j:pac4j-core@5.7.0(CSRF) — already fixed onmainvia Dependabot Chore(deps): Bump org.pac4j:pac4j-core from 5.7.0 to 5.7.10 in /openmetadata-service #27503 → 5.7.10. Needs a separate cherry-pick to 1.13.org.apache.logging.log4j:log4j-core@2.25.3× 3 (Rfc5424Layout / XmlLayout / Log4j1XmlLayout). No upstream release available — the Apache advisory states the fix is only in master. Recommend a Snyk policy ignore until Apache cuts a 2.25.4+ release.ReflectionUtil.createConnectionConfigClass→Class.forName(clazzName)driven by user-suppliedconnectionType. This is a static-analysis finding on OpenMetadata's own code, separate from dependency CVEs, and is best addressed by replacingClass.forNamewith an allowlist of registered service-type → class mappings.Test plan
mvn dependency:treeresolvesio.netty:netty-codec,io.netty:netty-codec-http2, andio.netty:netty-codec-dnsto 4.1.133.Final inopenmetadata-serviceandopenmetadata-mcpmvn clean package -DskipTests)🤖 Generated with Claude Code
Summary by Gitar
ColumnProfileTablefromantdtocorecomponentsTable.This will update automatically on new commits.