Skip to content

fix: batch simple dependency bumps#102

Open
lfarrel6 wants to merge 1 commit into
mainfrom
claude/com-176/batch-dependency-bumps-sesn_01TeKzzZQVifCN4jFwovj9cU
Open

fix: batch simple dependency bumps#102
lfarrel6 wants to merge 1 commit into
mainfrom
claude/com-176/batch-dependency-bumps-sesn_01TeKzzZQVifCN4jFwovj9cU

Conversation

@lfarrel6
Copy link
Copy Markdown
Member

@lfarrel6 lfarrel6 commented May 22, 2026

Pins the following Netty and BouncyCastle artifacts via the existing allprojects resolutionStrategy.force() block in build.gradle.kts, and regenerates the five Gradle lockfiles accordingly. All three deps are build-time transitives only (AGP Unified Test Platform / Kotlin compiler toolchain) and are never bundled into any shipped AAR/APK.

CVE-2026-33870 (HIGH, CVSS 7.5) — io.netty:netty-codec-http
4.1.129.Final -> 4.1.132.Final
HTTP/1.1 chunked encoding request smuggling.
https://github.com/evervault/evervault-android/security/dependabot/28

CVE-2026-33871 (HIGH) — io.netty:netty-codec-http2
4.1.93.Final / 4.1.110.Final -> 4.1.132.Final
Unbounded HTTP/2 CONTINUATION frames CPU DoS.
https://github.com/evervault/evervault-android/security/dependabot/29

CVE-2026-3505 (HIGH) — org.bouncycastle:{bcpg,bcpkix,bcprov,bcutil}-jdk18on
1.80 -> 1.84
Unbounded PGP AEAD chunk size in bcpg-jdk18on.
https://github.com/evervault/evervault-android/security/dependabot/33

Linear: COM-176

Pins the following Netty and BouncyCastle artifacts via the existing
allprojects resolutionStrategy.force() block in build.gradle.kts, and
regenerates the five Gradle lockfiles accordingly. All three deps are
build-time transitives only (AGP Unified Test Platform / Kotlin compiler
toolchain) and are never bundled into any shipped AAR/APK.

CVE-2026-33870 (HIGH, CVSS 7.5) — io.netty:netty-codec-http
  4.1.129.Final -> 4.1.132.Final
  HTTP/1.1 chunked encoding request smuggling.
  https://github.com/evervault/evervault-android/security/dependabot/28

CVE-2026-33871 (HIGH) — io.netty:netty-codec-http2
  4.1.93.Final / 4.1.110.Final -> 4.1.132.Final
  Unbounded HTTP/2 CONTINUATION frames CPU DoS.
  https://github.com/evervault/evervault-android/security/dependabot/29

CVE-2026-3505 (HIGH) — org.bouncycastle:{bcpg,bcpkix,bcprov,bcutil}-jdk18on
  1.80 -> 1.84
  Unbounded PGP AEAD chunk size in bcpg-jdk18on.
  https://github.com/evervault/evervault-android/security/dependabot/33

Linear: COM-176
@lfarrel6 lfarrel6 requested a review from matt-evervault May 22, 2026 20:12
@changeset-bot
Copy link
Copy Markdown

changeset-bot Bot commented May 22, 2026

⚠️ No Changeset found

Latest commit: 45d382c

Merging this PR will not cause a version bump for any packages. If these changes should not result in a new version, you're good to go. If these changes should result in a version bump, you need to add a changeset.

This PR includes no changesets

When changesets are added to this PR, you'll see the packages that this PR includes changesets for and the associated semver types

Click here to learn what changesets are, and how to add one.

Click here if you're a maintainer who wants to add a changeset to this PR

@socket-security
Copy link
Copy Markdown

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Updatedmaven/​io.netty/​netty-codec-http2@​4.1.93.Final ⏵ 4.1.132.Final66 -485 +2510075100
Updatedmaven/​org.bouncycastle/​bcpkix-jdk18on@​1.80 ⏵ 1.8466100 +290100100
Updatedmaven/​org.bouncycastle/​bcpg-jdk18on@​1.80 ⏵ 1.8486 -4100 +1690100100

View full report

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

2 participants