Skip to content

Conversation

@jamie-albert
Copy link
Member

@jamie-albert jamie-albert commented Sep 10, 2025

Summary

Updates multiple packages to address Netty CVE-2025-58056 and CVE-2025-58057 by upgrading netty components to fixed versions.

Package Changes

akhq

  • Epoch: 1 → 2
  • Changes:
    • Updated micronaut from 4.3.8 to 4.9.3
    • Updated netty version to 4.1.125.Final in gradle.properties
    • Updated patch comment to include GHSA-3p8m-j85q-pgmj
    • Removed build.gradle modifications from patch (simplified approach)

celeborn-0.5

  • Changes:
    • Removed auth/maven step as this causes dependencies to not be discoverable and breaks build
    • Updated netty.version from 4.1.118.Final to 4.1.125.Final in pombump-properties.yaml

kserve-modelmesh

  • Epoch: 15 → 16 (added GHSA-3p8m-j85q-pgmj to epoch comment)
  • Changes:
    • Added new patch netty-dep-additions.patch to explicitly declare netty dependencies
    • Added new pombump-properties.yaml with netty-version property
    • Updated netty-codec-http2 from 4.1.124.Final to 4.1.127.Final
    • Added netty-codec dependency at 4.1.127.Final
    • Added second maven/pombump step with properties-file configuration
    • Remove windows boringssl DLLS/Jars

CVEs Addressed

Verification

After these changes:

  1. Netty components should be updated to non-vulnerable versions
  2. All packages should build successfully with updated dependencies
  3. CVE scans should show the vulnerabilities as resolved

Notes

  • kserve-modelmesh now uses a hybrid approach with both explicit dependencies and pombump property management

@octo-sts octo-sts bot added the bincapz/blocking Bincapz (aka malcontent) scan results detected CRITICALs on the packages. label Sep 10, 2025
@jamie-albert
Copy link
Member Author

remaining cves are transitive deps and will need advisories

@jamie-albert jamie-albert requested a review from a team September 10, 2025 00:56
@dnegreira dnegreira assigned dnegreira and unassigned eslerm Sep 10, 2025
@dnegreira dnegreira marked this pull request as draft September 10, 2025 06:37
Signed-off-by: David Negreira <david.negreira@chainguard.dev>
@dnegreira dnegreira marked this pull request as ready for review September 10, 2025 06:48
@dnegreira dnegreira removed the bincapz/blocking Bincapz (aka malcontent) scan results detected CRITICALs on the packages. label Sep 10, 2025
@octo-sts octo-sts bot added the bincapz/pass bincapz/pass Bincapz (aka. malcontent) scan didn't detect any CRITICALs on the scanned packages. label Sep 10, 2025
@dnegreira dnegreira marked this pull request as draft September 10, 2025 06:59
efbar
efbar previously approved these changes Sep 10, 2025
Signed-off-by: David Negreira <david@otherreality.net>
@dnegreira
Copy link
Member

Advisories for the remaining CVEs: wolfi-dev/advisories#23399

@dnegreira dnegreira marked this pull request as ready for review September 10, 2025 07:36
@dnegreira dnegreira requested a review from a team September 10, 2025 07:51
@dnegreira dnegreira enabled auto-merge September 10, 2025 08:02
@dnegreira dnegreira merged commit f4a437f into wolfi-dev:main Sep 10, 2025
12 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

bincapz/pass bincapz/pass Bincapz (aka. malcontent) scan didn't detect any CRITICALs on the scanned packages.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants