Skip to content

fix(deps): update maven#178

Open
renovate[bot] wants to merge 1 commit into
mainfrom
renovate-main/maven
Open

fix(deps): update maven#178
renovate[bot] wants to merge 1 commit into
mainfrom
renovate-main/maven

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Mar 17, 2026

ℹ️ Note

This PR body was truncated due to platform limits.

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
org.apache.maven:maven-artifact (source) 3.9.113.9.12 age adoption passing confidence
io.micrometer:micrometer-core 1.16.31.16.5 age adoption passing confidence
org.projectlombok:lombok (source) 1.18.421.18.46 age adoption passing confidence
org.apache.maven.plugins:maven-deploy-plugin (source) 3.1.33.1.4 age adoption passing confidence
org.hibernate.orm:hibernate-processor (source) 7.2.4.Final7.2.12.Final age adoption passing confidence
org.hibernate.orm:hibernate-core (source) 7.2.4.Final7.2.12.Final age adoption passing confidence
org.testcontainers:testcontainers (source) 2.0.32.0.5 age adoption passing confidence
org.springframework.boot:spring-boot-test (source) 4.0.34.0.6 age adoption passing confidence
org.springframework.data:spring-data-jpa (source) 4.0.34.0.5 age adoption passing confidence
org.springframework.boot:spring-boot-starter-data-redis (source) 4.0.34.0.6 age adoption passing confidence
net.javacrumbs.shedlock:shedlock-provider-cassandra (source) 7.6.07.7.0 age adoption passing confidence
net.javacrumbs.shedlock:shedlock-core (source) 7.6.07.7.0 age adoption passing confidence
org.flywaydb:flyway-database-postgresql 11.14.111.20.3 age adoption passing confidence
org.flywaydb:flyway-core 11.14.111.20.3 age adoption passing confidence
org.springframework.data:spring-data-commons (source) 4.0.34.0.5 age adoption passing confidence
com.fasterxml.jackson:jackson-bom 2.20.22.21.2 age adoption passing confidence
org.springframework.boot:spring-boot-starter-jdbc (source) 4.0.34.0.6 age adoption passing confidence
org.springframework.data:spring-data-redis (source) 4.0.34.0.5 age adoption passing confidence
io.grpc:grpc-stub 1.77.01.79.0 age adoption passing confidence
io.grpc:grpc-protobuf 1.77.01.79.0 age adoption passing confidence
io.grpc:grpc-netty-shaded 1.77.01.79.0 age adoption passing confidence
com.arangodb:arangodb-java-driver (source) 7.25.07.26.0 age adoption passing confidence
org.springframework.boot:spring-boot-starter-data-cassandra (source) 4.0.34.0.6 age adoption passing confidence
org.mongodb:mongodb-driver-sync (source) 5.6.35.6.5 age adoption passing confidence
org.springframework.data:spring-data-mongodb (source) 5.0.35.0.5 age adoption passing confidence
org.postgresql:postgresql (source) 42.7.1042.7.11 age adoption passing confidence
org.springframework.boot:spring-boot-starter-test (source) 4.0.34.0.6 age adoption passing confidence
org.springframework.boot:spring-boot-autoconfigure (source) 4.0.34.0.6 age adoption passing confidence
org.springframework.data:spring-data-cassandra (source) 5.0.35.0.5 age adoption passing confidence
org.opensearch.client:opensearch-java 3.7.03.8.0 age adoption passing confidence
org.springframework:spring-test 7.0.57.0.7 age adoption passing confidence
org.springframework:spring-beans 7.0.57.0.7 age adoption passing confidence
org.springframework:spring-web 7.0.57.0.7 age adoption passing confidence
org.springframework:spring-context 7.0.57.0.7 age adoption passing confidence
org.springframework:spring-expression 7.0.57.0.7 age adoption passing confidence
org.springframework:spring-core 7.0.57.0.7 age adoption passing confidence
com.clickhouse:clickhouse-jdbc (source) 0.9.70.9.8 age adoption passing confidence

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


pgjdbc: Unbounded PBKDF2 iterations in SCRAM authentication allows CPU exhaustion DoS

CVE-2026-42198 / GHSA-98qh-xjc8-98pq

More information

Details

Summary

pgjdbc is vulnerable to a client-side denial of service during SCRAM-SHA-256 authentication.

Impact

A malicious server can instruct the driver to perform SCRAM authentication with a very large iteration count.
With a large enough value, the client spends an unbounded amount of CPU time inside PBKDF2 before authentication can fail.
A single attempt ties up a CPU core. Repeated or concurrent attempts exhaust client CPU and can wedge connection pools.

In affected versions, loginTimeout did not fully mitigate this problem. When loginTimeout expired, the caller could stop waiting, but the worker thread performing the connection attempt could continue running and burning CPU inside the SCRAM PBKDF2 computation.

This issue affects availability. It does not provide authentication bypass, privilege escalation, or direct password disclosure.

A user is vulnerable when all of the following are true:

  1. The connection uses SCRAM-SHA-256 authentication.
  2. The client reaches a malicious, compromised, or attacker-controlled PostgreSQL endpoint.
  3. That endpoint sends a very large SCRAM PBKDF2 iteration count in the server-first-message.

In practice, that can happen in these situations:

  • the application lets end users or tenants supply their own database connection details (as in many BI, reporting, analytics, ETL, and low-code platforms), so a user can point the shared client host at a server they control
  • the application accepts connection strings, hostnames, or JDBC URLs from user input, configuration uploaded by users, or other untrusted sources
  • the application is configured to connect to a PostgreSQL server that is itself malicious or later becomes compromised
  • the application connects through an untrusted proxy, relay, tunnel, bastion, or connection-pooling service that can act as the PostgreSQL server
  • an attacker can redirect the client to a fake PostgreSQL endpoint by manipulating DNS, service discovery, Kubernetes service resolution, /etc/hosts, environment variables, or similar indirection
  • an active network attacker on the path can impersonate the server because the connection does not strongly verify server identity (for example, sslmode lower than verify-full, or trusting a CA that signs hosts outside the operator's control)

The issue is more damaging when the application uses connection retries, many parallel connection attempts, or loginTimeout and assumes the timeout fully stops the work.

Patches

The patch introduces a new connection property, scramMaxIterations, with a default of 100K. The client now rejects SCRAM server messages that advertise more PBKDF2 iterations than the configured cap before starting the PBKDF2 computation begins.

Workarounds

Until a patched version of pgjdbc is deployed, the following measures reduce exposure:

  1. Only connect to trusted PostgreSQL servers whose identity is verified.
    Connect only to trusted PostgreSQL servers, and verify server identity with TLS using sslmode=verify-full and a trusted CA.
    TLS without certificate and hostname verification is not sufficient as an active network attacker can still impersonate the server.

  2. Do not rely on loginTimeout as a complete mitigation on unpatched versions.
    On affected versions, loginTimeout can stop the waiting caller while the worker thread continues spending CPU.

  3. Avoid SCRAM on untrusted or interceptable connection paths.
    For those paths, use an authentication method that does not let the server choose a SCRAM PBKDF2 iteration count.

  4. Reduce blast radius operationally.
    Limit parallel connection attempts, add retry backoff, isolate connection establishment in a separate worker or process when possible, and apply CPU or container limits where appropriate.

  5. On trusted servers you control, keep SCRAM iteration counts at ordinary values.
    This does not defend against an attacker-controlled server, but it avoids unnecessary client cost when talking to legitimate servers.

Severity

  • CVSS Score: 7.5 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


pgjdbc: Unbounded PBKDF2 iterations in SCRAM authentication allows CPU exhaustion DoS

BIT-postgresql-jdbc-driver-2026-42198 / CVE-2026-42198 / GHSA-98qh-xjc8-98pq

More information

Details

Summary

pgjdbc is vulnerable to a client-side denial of service during SCRAM-SHA-256 authentication.

Impact

A malicious server can instruct the driver to perform SCRAM authentication with a very large iteration count.
With a large enough value, the client spends an unbounded amount of CPU time inside PBKDF2 before authentication can fail.
A single attempt ties up a CPU core. Repeated or concurrent attempts exhaust client CPU and can wedge connection pools.

In affected versions, loginTimeout did not fully mitigate this problem. When loginTimeout expired, the caller could stop waiting, but the worker thread performing the connection attempt could continue running and burning CPU inside the SCRAM PBKDF2 computation.

This issue affects availability. It does not provide authentication bypass, privilege escalation, or direct password disclosure.

A user is vulnerable when all of the following are true:

  1. The connection uses SCRAM-SHA-256 authentication.
  2. The client reaches a malicious, compromised, or attacker-controlled PostgreSQL endpoint.
  3. That endpoint sends a very large SCRAM PBKDF2 iteration count in the server-first-message.

In practice, that can happen in these situations:

  • the application lets end users or tenants supply their own database connection details (as in many BI, reporting, analytics, ETL, and low-code platforms), so a user can point the shared client host at a server they control
  • the application accepts connection strings, hostnames, or JDBC URLs from user input, configuration uploaded by users, or other untrusted sources
  • the application is configured to connect to a PostgreSQL server that is itself malicious or later becomes compromised
  • the application connects through an untrusted proxy, relay, tunnel, bastion, or connection-pooling service that can act as the PostgreSQL server
  • an attacker can redirect the client to a fake PostgreSQL endpoint by manipulating DNS, service discovery, Kubernetes service resolution, /etc/hosts, environment variables, or similar indirection
  • an active network attacker on the path can impersonate the server because the connection does not strongly verify server identity (for example, sslmode lower than verify-full, or trusting a CA that signs hosts outside the operator's control)

The issue is more damaging when the application uses connection retries, many parallel connection attempts, or loginTimeout and assumes the timeout fully stops the work.

Patches

The patch introduces a new connection property, scramMaxIterations, with a default of 100K. The client now rejects SCRAM server messages that advertise more PBKDF2 iterations than the configured cap before starting the PBKDF2 computation begins.

Workarounds

Until a patched version of pgjdbc is deployed, the following measures reduce exposure:

  1. Only connect to trusted PostgreSQL servers whose identity is verified.
    Connect only to trusted PostgreSQL servers, and verify server identity with TLS using sslmode=verify-full and a trusted CA.
    TLS without certificate and hostname verification is not sufficient as an active network attacker can still impersonate the server.

  2. Do not rely on loginTimeout as a complete mitigation on unpatched versions.
    On affected versions, loginTimeout can stop the waiting caller while the worker thread continues spending CPU.

  3. Avoid SCRAM on untrusted or interceptable connection paths.
    For those paths, use an authentication method that does not let the server choose a SCRAM PBKDF2 iteration count.

  4. Reduce blast radius operationally.
    Limit parallel connection attempts, add retry backoff, isolate connection establishment in a separate worker or process when possible, and apply CPU or container limits where appropriate.

  5. On trusted servers you control, keep SCRAM iteration counts at ordinary values.
    This does not defend against an attacker-controlled server, but it avoids unnecessary client cost when talking to legitimate servers.

Severity

  • CVSS Score: 7.5 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Release Notes

apache/maven (org.apache.maven:maven-artifact)

v3.9.12: 3.9.12

🚀 New features and improvements

🐛 Bug Fixes

📝 Documentation updates

👻 Maintenance

🔧 Build

📦 Dependency updates

micrometer-metrics/micrometer (io.micrometer:micrometer-core)

v1.16.5: 1.16.5

Compare Source

🐞 Bug Fixes

  • Invalid reflection hint in micrometer-core for native GraalVM 25 build #​7316
  • ObservationGrpcClientInterceptor throws NPE when NameResolver returns empty authority #​7380
  • Wrong Nullability Information in OkHttpMetricsEventListener #​7373

🔨 Dependency Upgrades

  • Bump com.netflix.spectator:spectator-reg-atlas from 1.9.4 to 1.9.6 #​7393
  • Bump spring6 from 6.2.16 to 6.2.17 #​7294

❤️ Contributors

Thank you to all the contributors who worked on this release:

@​Joowon-Seo, and @​ribafish

v1.16.4: 1.16.4

Compare Source

🐞 Bug Fixes

  • Using context-propagation with a no-op Observation corrupts the current Observation #​7200

📔 Documentation

  • Document (Default)MeterObservationHandler #​6361
  • Document Jakarta Mail instrumentation #​6485
  • Document statsd UDS config #​5730

❤️ Contributors

Thank you to all the contributors who worked on this release:

@​izeye, @​kangdaeun1022, and @​seonghyeoklee

projectlombok/lombok (org.projectlombok:lombok)

v1.18.46

v1.18.44

hibernate/hibernate-orm (org.hibernate.orm:hibernate-processor)

v7.2.12.Final

Compare Source

v7.2.11.Final

Compare Source

v7.2.10.Final

Compare Source

v7.2.9.Final

Compare Source

v7.2.8.Final

Compare Source

v7.2.7.Final

Compare Source

v7.2.6.Final

Compare Source

v7.2.5.Final

Compare Source

testcontainers/testcontainers-java (org.testcontainers:testcontainers)

v2.0.5

Compare Source

What's Changed

🚀 Features & Enhancements

🐛 Bug Fixes

📖 Documentation

🧹 Housekeeping

📦 Dependency updates

16 changes

v2.0.4

Compare Source

What's Changed

📖 Documentation

📦 Dependency updates

spring-projects/spring-boot (org.springframework.boot:spring-boot-test)

v4.0.6

v4.0.5

🐞 Bug Fixes
  • Test starter for Spring Integration does not include Spring Integration test module #​49784
  • Some sliced tests that import TransactionAutoConfiguration do not import TransactionManagerCustomizationAutoConfiguration #​49782
  • WebSocket messaging's task executors are only auto-configured and stompWebSocketHandlerMapping is only forced to be eager when using Jackson #​49753
  • WebSocket app fails to start when Jackson is on the classpath but there's no JsonMapper bean #​49749
  • Metadata annotation processor ignores method-level @NestedConfigurationProperty when using constructor binding #​49738
  • Override of property in external 'application.properties' or 'application.yaml' is ignored #​49731
  • NativeImageResourceProvider does not find Flyway migration scripts in subdirectories #​49706
  • Add @ConditionalOnWebApplication to NettyReactiveWebServerAutoConfiguration #​49695
  • @GraphQlTest does not include @ControllerAdvice #​49672
📔 Documentation
  • Fix incorrect indefinite articles in Javadoc #​49727
  • Add some more Kotlin examples and trivial style fixes #​49714
  • Overhaul Spring Session documentation following modularization [#​49704](https://redirect.gith

Note

PR body was truncated to here.


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • At any time (no schedule defined)
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot added the branch:main label Mar 17, 2026
@renovate renovate Bot requested a review from lis0x90 as a code owner March 17, 2026 21:08
@renovate renovate Bot assigned ArkuNC and lis0x90 Mar 17, 2026
@renovate renovate Bot requested a review from ArkuNC March 17, 2026 21:09
@renovate renovate Bot force-pushed the renovate-main/maven branch from dc80f86 to 5581521 Compare March 18, 2026 12:59
@renovate renovate Bot changed the title chore(deps): update maven to v7.7.0 chore(deps): update maven Mar 18, 2026
@sonarqubecloud
Copy link
Copy Markdown

@renovate renovate Bot force-pushed the renovate-main/maven branch 5 times, most recently from c26a274 to dc410ff Compare March 24, 2026 10:05
@renovate renovate Bot force-pushed the renovate-main/maven branch 3 times, most recently from f5e507b to 3d5ec8a Compare April 2, 2026 10:27
@renovate renovate Bot force-pushed the renovate-main/maven branch 3 times, most recently from 96f4838 to 3d3e36d Compare April 13, 2026 10:01
@renovate renovate Bot force-pushed the renovate-main/maven branch 3 times, most recently from 5ca5137 to 928f1ea Compare April 17, 2026 19:19
@renovate renovate Bot force-pushed the renovate-main/maven branch 5 times, most recently from 28ae120 to 75207f1 Compare April 27, 2026 20:54
@renovate renovate Bot force-pushed the renovate-main/maven branch from 75207f1 to ea82867 Compare April 29, 2026 09:34
@renovate renovate Bot force-pushed the renovate-main/maven branch from ea82867 to e067a9f Compare May 22, 2026 03:47
@renovate renovate Bot added the security label May 22, 2026
@renovate renovate Bot changed the title chore(deps): update maven fix(deps): update maven May 22, 2026
@github-actions github-actions Bot added the bug Something isn't working label May 22, 2026
@sonarqubecloud
Copy link
Copy Markdown

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants