Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Jun 1, 2025

This PR contains the following updates:

Package Update Change OpenSSF
papermc (source) patch 1.21.4 -> 1.21.10 OpenSSF Scorecard

Release Notes

PaperMC/Paper (papermc)

v1.21.7

Compare Source

v1.21.6

Compare Source

v1.21.5

Compare Source


Configuration

📅 Schedule: Branch creation - Between 12:00 AM and 03:59 AM, on day 1 of the month ( * 0-3 1 * * ) (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from Djaytan as a code owner June 1, 2025 01:06
Copy link
Owner

@Djaytan Djaytan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Waiting PaperMC team to release a stable version.

@renovate renovate bot force-pushed the renovate/papermc-1.x branch from 5bd99fc to 4665c45 Compare June 6, 2025 18:19
@renovate renovate bot force-pushed the renovate/papermc-1.x branch from 4665c45 to 50d065d Compare June 17, 2025 16:56
@renovate renovate bot changed the title chore(deps): update dependency papermc to v1.21.5 chore(deps): update dependency papermc to v1.21.6 Jun 17, 2025
@renovate renovate bot changed the title chore(deps): update dependency papermc to v1.21.6 chore(deps): update dependency papermc to v1.21.6 - autoclosed Jun 24, 2025
@renovate renovate bot closed this Jun 24, 2025
@renovate renovate bot deleted the renovate/papermc-1.x branch June 24, 2025 07:38
@renovate renovate bot changed the title chore(deps): update dependency papermc to v1.21.6 - autoclosed chore(deps): update dependency papermc to v1.21.6 Jul 1, 2025
@renovate renovate bot reopened this Jul 1, 2025
@renovate renovate bot force-pushed the renovate/papermc-1.x branch from d8746c1 to 50d065d Compare July 1, 2025 01:40
@renovate renovate bot changed the title chore(deps): update dependency papermc to v1.21.6 chore(deps): update dependency papermc to v1.21.7 Jul 1, 2025
@github-actions
Copy link

github-actions bot commented Jul 1, 2025

Overview

Image reference djaytan/papermc-server:1.21.4 djaytan/papermc-server:test
- digest 3c6c37e3f2f8 ce4ea8380b66
- tag 1.21.4 test
- stream latest
- provenance 221f80c
- vulnerabilities critical: 0 high: 5 medium: 6 low: 2 critical: 0 high: 4 medium: 6 low: 2
- platform linux/amd64 linux/amd64
- size 133 MB 145 MB (+12 MB)
- packages 170 177 (+7)
Base Image alpine:3.22.0
also known as:
3
3.22
latest
alpine:3
also known as:
3.22
latest
- vulnerabilities critical: 0 high: 0 medium: 1 low: 2 critical: 0 high: 0 medium: 1 low: 2
Policies (1 improved, 1 worsened, 3 missing data)
Policy Name djaytan/papermc-server:1.21.4 djaytan/papermc-server:test Change Standing
No unapproved base images ⚠️ 1 ❓ No data
Default non-root user No Change
No AGPL v3 licenses No Change
No fixable critical or high vulnerabilities ⚠️ 7 ⚠️ 4 -3 Improved
No high-profile vulnerabilities No Change
No outdated base images ❓ No data
SonarQube quality gates passed ❓ No data ❓ No data
Supply chain attestations ⚠️ 2 +2 Worsened
Packages and Vulnerabilities (31 package changes and 1 vulnerability changes)
  • ➕ 8 packages added
  • ➖ 1 packages removed
  • ♾️ 22 packages changed
  • 143 packages unchanged
  • ✔️ 1 vulnerabilities removed
Changes for packages of type apk (7 changes)
Package Version
djaytan/papermc-server:1.21.4
Version
djaytan/papermc-server:test
alpine-base 3.22.0-r0
ca-certificates 20241121-r2
gcc 14.2.0-r6
ncurses 6.5_p20250503-r0
openssl 3.5.0-r0
critical: 0 high: 0 medium: 1 low: 0
Added vulnerabilities (1):
  • medium : CVE--2025--4575
pax-utils 1.3.8-r1
xz 5.8.1-r0
Changes for packages of type generic (2 changes)
Package Version
djaytan/papermc-server:1.21.4
Version
djaytan/papermc-server:test
openjdk 21.0.7
openjdk 21.0.7
Changes for packages of type maven (22 changes)
Package Version
djaytan/papermc-server:1.21.4
Version
djaytan/papermc-server:test
♾️ com.google.protobuf/protobuf-java 4.26.1 4.29.0
critical: 0 high: 1 medium: 0 low: 0
Removed vulnerabilities (1):
  • high : CVE--2024--7254
♾️ com.mysql/mysql-connector-j 9.1.0 9.2.0
♾️ io.netty/netty-codec-haproxy 4.1.115.Final 4.1.118.Final
♾️ io.papermc.paperclip.Main/papermc-server 1.21.4-232 1.21.8-60
♾️ net.kyori.adventure.key/adventure-key 4.20.0 4.24.0
♾️ net.kyori.adventure.text.logger.slf4j/adventure-text-logger-slf4j 4.20.0 4.24.0
♾️ net.kyori.adventure.text.minimessage/adventure-text-minimessage 4.20.0 4.24.0
♾️ net.kyori.adventure.text.serializer.ansi/adventure-text-serializer-ansi 4.20.0 4.24.0
♾️ net.kyori.adventure.text.serializer.constant/adventure-text-serializer-commons 4.20.0 4.24.0
♾️ net.kyori.adventure.text.serializer.gson/adventure-text-serializer-gson 4.20.0 4.24.0
♾️ net.kyori.adventure.text.serializer.json/adventure-text-serializer-json 4.20.0 4.24.0
♾️ net.kyori.adventure.text.serializer.legacy/adventure-text-serializer-legacy 4.20.0 4.24.0
♾️ net.kyori.adventure.text.serializer.plain/adventure-text-serializer-plain 4.20.0 4.24.0
♾️ net.kyori.adventure/adventure-api 4.20.0 4.24.0
♾️ net.md-5/bungeecord-chat 1.20-R0.2 1.21-R0.2
♾️ org.bukkit/paper-api 1.21.4-R0.1-SNAPSHOT 1.21.8-R0.1-SNAPSHOT
♾️ org.objectweb.asm.commons/asm-commons 9.7.1 9.8
♾️ org.objectweb.asm.tree/asm-tree 9.7.1 9.8
♾️ org.spongepowered.configurate.yaml/configurate-yaml 4.2.0-20250225.064233-199 4.2.0
♾️ org.spongepowered.configurate/configurate-core 4.2.0-20250225.064233-204 4.2.0
♾️ org.xerial/sqlite-jdbc 3.47.0.0 3.49.1.0
♾️ spark-paper/spark-paper 1.10.119-20241121.092015-1 1.10.133-20250413.112336-1

@github-actions
Copy link

github-actions bot commented Jul 1, 2025

🔍 Vulnerabilities of djaytan/papermc-server:test

📦 Image Reference djaytan/papermc-server:test
digestsha256:ce4ea8380b66aa5b3c08df7f37e7f8cefef8f5677f292b3470f280e5a9e059e1
vulnerabilitiescritical: 0 high: 4 medium: 6 low: 2
platformlinux/amd64
size145 MB
packages177
📦 Base Image alpine:3
also known as
  • 3.22
  • 3.22.0
  • latest
digestsha256:08001109a7d679fe33b04fa51d681bd40b975d8f5cea8c3ef6c0eccb6a7338ce
vulnerabilitiescritical: 0 high: 0 medium: 1 low: 2
critical: 0 high: 4 medium: 1 low: 0 org.apache.commons/commons-compress 1.5 (maven)

pkg:maven/org.apache.commons/[email protected]

high 7.5: CVE--2021--36090 Improper Handling of Length Parameter Inconsistency

Affected range<1.21
Fixed version1.21
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score0.279%
EPSS Percentile51st percentile
Description

When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.

high 7.5: CVE--2021--35517 Improper Handling of Length Parameter Inconsistency

Affected range<1.21
Fixed version1.21
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score0.280%
EPSS Percentile51st percentile
Description

When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package.

high 7.5: CVE--2021--35516 Improper Handling of Length Parameter Inconsistency

Affected range<1.21
Fixed version1.21
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score0.311%
EPSS Percentile54th percentile
Description

When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package.

high 7.5: CVE--2021--35515 Excessive Iteration

Affected range<1.21
Fixed version1.21
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score0.119%
EPSS Percentile32nd percentile
Description

When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.

medium 5.9: CVE--2024--25710 Loop with Unreachable Exit Condition ('Infinite Loop')

Affected range>=1.3
<1.26.0
Fixed version1.26.0
CVSS Score5.9
CVSS VectorCVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
EPSS Score0.012%
EPSS Percentile1st percentile
Description

Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Apache Commons Compress. This issue affects Apache Commons Compress: from 1.3 through 1.25.0.

Users are recommended to upgrade to version 1.26.0 which fixes the issue.

critical: 0 high: 0 medium: 2 low: 0 golang.org/x/net 0.34.0 (golang)

pkg:golang/golang.org/x/[email protected]

medium 5.3: CVE--2025--22872 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Affected range<0.38.0
Fixed version0.38.0
CVSS Score5.3
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
EPSS Score0.023%
EPSS Percentile5th percentile
Description

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).

medium 4.4: CVE--2025--22870 Misinterpretation of Input

Affected range<0.36.0
Fixed version0.36.0
CVSS Score4.4
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
EPSS Score0.015%
EPSS Percentile2nd percentile
Description

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

critical: 0 high: 0 medium: 1 low: 0 stdlib 1.24.4 (golang)

pkg:golang/[email protected]

medium : CVE--2025--47906

Affected range>=1.24.0
<1.24.6
Fixed version1.24.6
EPSS Score0.022%
EPSS Percentile4th percentile
Description

If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath ("", ".", and ".."), can result in the binaries listed in the PATH being unexpectedly returned.

critical: 0 high: 0 medium: 1 low: 0 commons-lang/commons-lang 2.6 (maven)

pkg:maven/commons-lang/[email protected]

medium 6.5: CVE--2025--48924 Uncontrolled Recursion

Affected range>=2.0
<=2.6
Fixed versionNot Fixed
CVSS Score6.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
EPSS Score0.066%
EPSS Percentile21st percentile
Description

Uncontrolled Recursion vulnerability in Apache Commons Lang.

This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0.

The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a StackOverflowError could cause an application to stop.

Users are recommended to upgrade to version 3.18.0, which fixes the issue.

critical: 0 high: 0 medium: 1 low: 0 openssl 3.5.0-r0 (apk)

pkg:apk/alpine/[email protected]?os_name=alpine&os_version=3.22

medium : CVE--2025--4575

Affected range<3.5.1-r0
Fixed version3.5.1-r0
EPSS Score0.039%
EPSS Percentile11th percentile
Description
critical: 0 high: 0 medium: 0 low: 2 busybox 1.37.0-r18 (apk)

pkg:apk/alpine/[email protected]?os_name=alpine&os_version=3.22

low : CVE--2025--46394

Affected range<=1.37.0-r19
Fixed versionNot Fixed
EPSS Score0.011%
EPSS Percentile1st percentile
Description

low : CVE--2024--58251

Affected range<=1.37.0-r19
Fixed versionNot Fixed
EPSS Score0.015%
EPSS Percentile2nd percentile
Description

@renovate renovate bot force-pushed the renovate/papermc-1.x branch from 50d065d to bf50cc9 Compare July 1, 2025 07:03
@renovate renovate bot force-pushed the renovate/papermc-1.x branch from bf50cc9 to f039194 Compare July 17, 2025 20:01
@renovate renovate bot changed the title chore(deps): update dependency papermc to v1.21.7 chore(deps): update dependency papermc to v1.21.8 Jul 17, 2025
@sonarqubecloud
Copy link

@renovate renovate bot force-pushed the renovate/papermc-1.x branch 2 times, most recently from 6cbac6d to 44f96fa Compare September 30, 2025 10:25
@renovate renovate bot changed the title chore(deps): update dependency papermc to v1.21.8 chore(deps): update dependency papermc to v1.21.9 Sep 30, 2025
@renovate renovate bot force-pushed the renovate/papermc-1.x branch from 44f96fa to 57bbbd8 Compare October 7, 2025 19:29
@renovate renovate bot changed the title chore(deps): update dependency papermc to v1.21.9 chore(deps): update dependency papermc to v1.21.10 Oct 7, 2025
@sonarqubecloud
Copy link

sonarqubecloud bot commented Oct 7, 2025

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants