Skip to content

Commit eec0079

Browse files
committed
fix: Upgrade Apache Avro to 1.12.1 to address CVE-2025-33042
Overrides Spark's transitive Avro dependency (1.12.0) with the patched version to fix a code injection vulnerability in the Apache Avro Java SDK. The vulnerability allows code injection when processing untrusted Avro schemas. While Pathling does not accept user-provided schemas, upgrading eliminates the vulnerability and unblocks the CI security scan. Added CVE to .trivyignore since Avro is not bundled in library-runtime (provided at runtime) and server explicitly overrides to fixed version.
1 parent 427e517 commit eec0079

File tree

2 files changed

+10
-0
lines changed

2 files changed

+10
-0
lines changed

.trivyignore

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,10 @@ CVE-2025-48924
3333
# Log4j is provided via Spark, not bundled in distribution.
3434
CVE-2025-68161
3535

36+
# Avro is provided via Spark, not bundled in library-runtime distribution.
37+
# Server overrides to patched version 1.12.1 in server/pom.xml.
38+
CVE-2025-33042
39+
3640
# Nimbus JOSE JWT is provided via Spring Security OAuth2, not directly controlled.
3741
CVE-2025-53864
3842

server/pom.xml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -383,6 +383,12 @@
383383
<artifactId>jakarta.servlet-api</artifactId>
384384
<version>6.0.0</version>
385385
</dependency>
386+
<!-- Override Spark's Avro version to fix CVE-2025-33042. -->
387+
<dependency>
388+
<groupId>org.apache.avro</groupId>
389+
<artifactId>avro</artifactId>
390+
<version>1.12.1</version>
391+
</dependency>
386392
</dependencies>
387393
</dependencyManagement>
388394

0 commit comments

Comments
 (0)