Skip to content

Bump Netty version to 4.2.10.Final#65

Open
AzaleeX wants to merge 1 commit intoCloudburstMC:developfrom
AzaleeX:develop
Open

Bump Netty version to 4.2.10.Final#65
AzaleeX wants to merge 1 commit intoCloudburstMC:developfrom
AzaleeX:develop

Conversation

@AzaleeX
Copy link

@AzaleeX AzaleeX commented Feb 7, 2026

Update Gradle versions catalog to use Netty 4.2.10.Final (was 4.1.101.Final). This ensures projects referencing the catalog will resolve the newer Netty release.

Update Gradle versions catalog to use Netty 4.2.10.Final (was 4.1.101.Final). This ensures projects referencing the catalog will resolve the newer Netty release.
Copilot AI review requested due to automatic review settings February 7, 2026 20:54
Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Updates the repository’s Gradle version catalog to reference a newer Netty release, so modules using the shared libs catalog resolve the updated Netty dependency set.

Changes:

  • Bump netty version in the Gradle versions catalog from 4.1.101.Final to 4.2.10.Final.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@AzaleeX
Copy link
Author

AzaleeX commented Feb 7, 2026

Currently, the netty-codec used by CloudBust Network has a vulnerability.

Dependency maven:io.netty:netty-codec:4.1.101.Final is vulnerable

Update to unaffected version 4.1.125.Final

CVE-2025-58057, Score: 7.5

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In netty-codec-compression versions 4.1.124.Final and below, and netty-codec versions 4.2.4.Final and below, when supplied with specially crafted input, BrotliDecoder and certain other decompression decoders will allocate a large number of reachable byte buffers, which can lead to denial of service. BrotliDecoder.decompress has no limit in how often it calls pull, decompressing data 64K bytes at a time. The buffers are saved in the output list, and remain reachable until OOM is hit. This is fixed in versions 4.1.125.Final of netty-codec and 4.2.5.Final of netty-codec-compression.

Read More: https://www.mend.io/vulnerability-database/CVE-2025-58057?utm_source=Jetbrains

Results powered by Mend.io

@SupremeMortal
Copy link
Member

SupremeMortal commented Feb 7, 2026

Worth noting that the dependency you mention in Netty we don't use, so the attack area is non-existent. I think this is less about security and more about upgrading to Netty 4.2.x. I know people have had issues with 4.2.x, so I'm not keen to move onto it unless people have confirmed the issues are resolved.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants