Skip to content

security: Bump vulnerable client deps (TRI-937)#891

Merged
mc-nv merged 1 commit into
r26.04from
mchornyi/TRI-937/client-fixes
Apr 23, 2026
Merged

security: Bump vulnerable client deps (TRI-937)#891
mc-nv merged 1 commit into
r26.04from
mchornyi/TRI-937/client-fixes

Conversation

@mc-nv
Copy link
Copy Markdown
Contributor

@mc-nv mc-nv commented Apr 23, 2026

Resolves: TRI-937
CI (internal): [#49253202](http://tritonserver.local/ci/pipelines/49253202)

Description

Routine dependency maintenance for the client/ generated gRPC bindings. Bumps dependencies flagged by the internal security scan for the 26.04 release.

Changes

JavaScript (src/grpc_generated/javascript/)

  • @grpc/proto-loader ^0.7.8^0.8.0
  • Add overrides pin for protobufjs ^7.5.5
  • Regenerated package-lock.json (lockfileVersion 3)

Go (src/grpc_generated/go/)

  • google.golang.org/grpc v1.77.0v1.80.0

Java (src/grpc_generated/java/library/, .../examples/)

  • All io.grpc:* artifacts 1.59.11.80.0
  • tomcat-annotations-api 11.0.1111.0.21

Affected Files

  • src/grpc_generated/javascript/package.json
  • src/grpc_generated/javascript/package-lock.json
  • src/grpc_generated/go/go.mod
  • src/grpc_generated/go/go.sum
  • src/grpc_generated/java/library/pom.xml
  • src/grpc_generated/java/examples/pom.xml

Test plan

  • CI pipeline: 49253202 on mchornyi/TRI-937/client-fixes.
  • Re-scan confirms clean result for the 26.04 release.

Addresses nSpect High/Critical findings in Triton 26.04 source scan:

JavaScript (src/grpc_generated/javascript):
- @grpc/proto-loader ^0.7.8 -> ^0.8.0
- Add overrides for protobufjs ^7.5.5
- Fixes CVE-2023-36665 (Critical, prototype pollution)
- Fixes CVE-2026-41242 / BDSA-2026-7420, BDSA-2026-7553 (High, RCE)

Go (src/grpc_generated/go):
- google.golang.org/grpc v1.77.0 -> v1.80.0
- Fixes CVE-2026-33186 / BDSA-2026-4421 (High, :path auth bypass;
  patched in v1.79.3+)

Java (src/grpc_generated/java):
- io.grpc artifacts 1.59.1 -> 1.80.0 (bundled Netty 4.1.130+)
- tomcat-annotations-api 11.0.11 -> 11.0.21
- Fixes CVE-2025-55163 (High, Netty MadeYouReset DDoS)
- Fixes BDSA-2026-2348 / CVE-2026-24734 (Tomcat OCSP bypass)
- Fixes BDSA-2026-6722 / CVE-2026-24880 (Tomcat request smuggling)
- Fixes BDSA-2026-6723 / CVE-2026-29146 (Tomcat padding oracle)
- Fixes BDSA-2026-6784 / CVE-2026-34486 (Tomcat cluster plaintext)
@mc-nv mc-nv self-assigned this Apr 23, 2026
@mc-nv mc-nv marked this pull request as ready for review April 23, 2026 14:59
@mc-nv mc-nv merged commit 22e11c4 into r26.04 Apr 23, 2026
3 checks passed
@mc-nv mc-nv deleted the mchornyi/TRI-937/client-fixes branch April 23, 2026 15:43
mc-nv added a commit that referenced this pull request Apr 28, 2026
Addresses High/Critical findings in Triton 26.04 source scan:
mc-nv added a commit that referenced this pull request Apr 29, 2026
Addresses High/Critical findings in Triton 26.04 source scan:
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

2 participants