[Snyk] Fix for 29 vulnerabilities #50
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Snyk has created this PR to fix 29 vulnerabilities in the maven dependencies of this project.
Snyk changed the following file(s):
pom.xmlThis analysis focuses on the potential breaking changes for the specified package upgrades.
Breaking Change Assessment: High
This set of upgrades introduces significant changes, particularly within the Apache Hudi and Apache Parquet dependencies. The upgrade from
hudi-common1.0.0-SNAPSHOT to 1.1.0 is a major evolution, and theparquet-avroupdate spans multiple minor versions with notable modifications.org.apache.hudi:hudi-common @ 1.0.0-SNAPSHOT → 1.1.0 (High Risk): This upgrade moves from a development snapshot to a new minor version, introducing substantial changes. The Hudi 1.1.0 release plans to deprecate existing
Payloadclasses in favor of standardized built-in merge modes, which will require code modifications for custom merging logic. Additionally, official support for Spark 4 will default to Java 17, potentially impacting environments on older JDKs. The release also removes the direct dependency on HBase by introducing a native HFile writer.Recommendation: Developers must review their use of custom
Payloadclasses and migrate to the new built-in merge modes. Validate the application's compatibility with the new HFile format and prepare for a potential JDK upgrade if using Spark 4.org.apache.parquet:parquet-avro @ 1.13.1 → 1.15.2 (Medium Risk): This upgrade crosses two minor versions. A key change introduced to address a security vulnerability (CVE-2025-46762) is the restriction of trusted packages for schema resolution when using "specific" or "reflect" data models. If your application relies on these models for Avro schema conversion, you may need to explicitly configure which packages are considered trusted.
Recommendation: Review code that uses
parquet-avrowith "specific" or "reflect" models and test schema resolution. If needed, configure theorg.apache.parquet.avro.trusted.packagessystem property.org.apache.avro:avro @ 1.11.2 → 1.11.4 (Low Risk): This is a patch-level update consisting primarily of bug fixes. Version 1.11.4 introduces a change to restrict trusted packages in
ReflectDataandSpecificDatafor security purposes. This is unlikely to affect most users but could be a breaking change for applications using reflection with classes from untrusted packages.Recommendation: Merge and test. The risk of functional breakage is low unless advanced reflection features are in use.
Additional Upgrades
SNAPSHOTversion.Vulnerabilities that will be fixed with an upgrade:
SNYK-JAVA-ORGAPACHEPARQUET-9638681
1.13.1->1.15.2ReachableProof of ConceptSNYK-JAVA-ORGAPACHEAVRO-8161188
1.11.2->1.11.4ReachableNo Known ExploitSNYK-JAVA-ORGXERIALSNAPPY-5710960
1.13.1->1.15.2ReachableProof of ConceptSNYK-JAVA-ORGXERIALSNAPPY-5918282
1.13.1->1.15.2ReachableProof of ConceptSNYK-JAVA-ORGXERIALSNAPPY-5710961
1.13.1->1.15.2ReachableProof of ConceptSNYK-JAVA-ORGAPACHEZOOKEEPER-5961102
No Path FoundNo Known ExploitSNYK-JAVA-ORGAPACHEPARQUET-10060156
1.13.1->1.15.2No Path FoundNo Known ExploitSNYK-JAVA-ORGXERIALSNAPPY-5710959
1.13.1->1.15.2No Path FoundProof of ConceptSNYK-JAVA-ORGAPACHECOMMONS-10734078
No Path FoundNo Known ExploitSNYK-JAVA-IONETTY-564897
No Path FoundNo Known ExploitSNYK-JAVA-IONETTY-8707740
No Path FoundProof of ConceptSNYK-JAVA-IONETTY-8367012
No Path FoundProof of ConceptSNYK-JAVA-ORGAPACHECOMMONS-6254296
1.11.2->1.11.4No Path FoundNo Known ExploitSNYK-JAVA-IONETTY-1584063
No Path FoundNo Known ExploitSNYK-JAVA-COMGOOGLEPROTOBUF-8055227
No Path FoundNo Known ExploitSNYK-JAVA-IONETTY-1584064
No Path FoundNo Known ExploitSNYK-JAVA-IONETTY-5725787
No Path FoundNo Known ExploitSNYK-JAVA-ORGAPACHECOMMONS-5901530
1.11.2->1.11.4No Path FoundNo Known ExploitSNYK-JAVA-IONETTY-1082234
No Path FoundNo Known ExploitSNYK-JAVA-IONETTY-1082235
No Path FoundNo Known ExploitSNYK-JAVA-IONETTY-1082236
No Path FoundNo Known ExploitSNYK-JAVA-IONETTY-1082238
No Path FoundNo Known ExploitSNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-31517
ReachableNo Known ExploitSNYK-JAVA-IONETTY-2812456
No Path FoundNo Known ExploitSNYK-JAVA-COMMONSCODEC-561518
ReachableNo Known ExploitSNYK-JAVA-ORGAPACHEAVRO-5926693
1.11.2->1.11.4No Path FoundNo Known ExploitSNYK-JAVA-COMMONSIO-8161190
No Path FoundNo Known ExploitSNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-1048058
No Path FoundNo Known ExploitSNYK-JAVA-ORGAPACHECOMMONS-6254297
1.11.2->1.11.4No Path FoundNo Known ExploitVulnerabilities that could not be fixed
org.apache.hudi:hudi-common@1.0.0-SNAPSHOTtoorg.apache.hudi:hudi-common@1.1.0; Reasoncould not apply upgrade, dependency is managed externally; Location:provenance does not contain locationorg.apache.hudi:hudi-datahub-sync@1.0.0-SNAPSHOTtoorg.apache.hudi:hudi-datahub-sync@1.0.1; Reasoncould not apply upgrade, dependency is managed externally; Location:provenance does not contain locationImportant
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Uncontrolled Resource Consumption ('Resource Exhaustion')
🦉 Information Disclosure
🦉 Improper Input Validation
🦉 More lessons are available in Snyk Learn