| <?xml version="1.0" encoding="UTF-8"?> |
| <!-- |
| |
| Licensed to the Apache Software Foundation (ASF) under one |
| or more contributor license agreements. See the NOTICE file |
| distributed with this work for additional information |
| regarding copyright ownership. The ASF licenses this file |
| to you under the Apache License, Version 2.0 (the |
| "License"); you may not use this file except in compliance |
| with the License. You may obtain a copy of the License at |
| |
| http://www.apache.org/licenses/LICENSE-2.0 |
| |
| Unless required by applicable law or agreed to in writing, |
| software distributed under the License is distributed on an |
| "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| KIND, either express or implied. See the License for the |
| specific language governing permissions and limitations |
| under the License. |
| |
| --> |
| <suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd"> |
| <!-- add supressions for known vulnerabilities detected by OWASP Dependency Check --> |
| <suppress> |
| <notes>Ignore netty CVEs in GRPC shaded Netty.</notes> |
| <filePath regex="true">.*grpc-netty-shaded.*</filePath> |
| <cpe>cpe:/a:netty:netty</cpe> |
| </suppress> |
| <suppress> |
| <notes>Suppress libthrift-0.12.0.jar vulnerabilities</notes> |
| <gav>org.apache.thrift:libthrift:0.12.0</gav> |
| <vulnerabilityName regex="true">.*</vulnerabilityName> |
| </suppress> |
| |
| <!-- influxdb dependencies --> |
| <suppress> |
| <notes><![CDATA[ |
| file name: msgpack-core-0.9.0.jar |
| ]]></notes> |
| <sha1>87d9ce0b22de48428fa32bb8ad476e18b6969548</sha1> |
| <cve>CVE-2022-41719</cve> |
| </suppress> |
| |
| <!-- see https://github.com/apache/pulsar/pull/16110 --> |
| <suppress> |
| <notes><![CDATA[ |
| file name: elasticsearch-java-8.1.0.jar |
| CVE-2022-23712 is only related to Elastic server. |
| ]]></notes> |
| <sha1>edf5be04cbc2eafc51540ba33f9536e788b9d60b</sha1> |
| <cve>CVE-2022-23712</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: elasticsearch-rest-client-8.1.0.jar |
| CVE-2022-23712 is only related to Elastic server. |
| ]]></notes> |
| <sha1>10e7aa09f10955a074c0a574cb699344d2745df1</sha1> |
| <cve>CVE-2022-23712</cve> |
| </suppress> |
| |
| <!-- see https://github.com/apache/pulsar/pull/14629 --> |
| <suppress> |
| <notes><![CDATA[ |
| file name: kotlin-stdlib-common-1.4.32.jar |
| ]]></notes> |
| <sha1>ef50bfa2c0491a11dcc35d9822edbfd6170e1ea2</sha1> |
| <cpe>cpe:/a:jetbrains:kotlin</cpe> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: kotlin-stdlib-jdk7-1.4.32.jar |
| ]]></notes> |
| <sha1>3546900a3ebff0c43f31190baf87a9220e37b7ea</sha1> |
| <cve>CVE-2022-24329</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: kotlin-stdlib-jdk8-1.4.32.jar |
| ]]></notes> |
| <sha1>3302f9ec8a5c1ed220781dbd37770072549bd333</sha1> |
| <cve>CVE-2022-24329</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: kotlin-stdlib-1.4.32.jar |
| ]]></notes> |
| <sha1>461367948840adbb0839c51d91ed74ef4a9ccb52</sha1> |
| <cve>CVE-2022-24329</cve> |
| </suppress> |
| |
| <!-- see https://github.com/alibaba/canal/issues/4010 --> |
| <suppress> |
| <notes><![CDATA[ |
| file name: canal.client-1.1.5.jar (shaded: com.google.guava:guava:22.0) |
| ]]></notes> |
| <sha1>b87878db57d5cfc2ca7d3972cc8f7486bf02fbca</sha1> |
| <cve>CVE-2018-10237</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: canal.client-1.1.5.jar (shaded: com.google.guava:guava:22.0) |
| ]]></notes> |
| <sha1>b87878db57d5cfc2ca7d3972cc8f7486bf02fbca</sha1> |
| <cve>CVE-2020-8908</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: canal.client-1.1.5.jar (shaded: com.google.guava:guava:32.1.1) |
| CVE cannot take effect. |
| Already covered by PR https://github.com/apache/pulsar/pull/20699 |
| ]]></notes> |
| <sha1>b87878db57d5cfc2ca7d3972cc8f7486bf02fbca</sha1> |
| <cve>CVE-2023-2976</cve> |
| </suppress> |
| <!-- clickhouse: security scan matches client lib to the server CVEs --> |
| <suppress> |
| <notes><![CDATA[ |
| file name: avro-1.10.2.jar |
| ]]></notes> |
| <sha1>a65aaa91c1aeceb3dd4859dbb9765d1c2063f5a2</sha1> |
| <cve>CVE-2021-43045</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2018-14668</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2018-14669</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2018-14670</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2018-14671</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2018-14672</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2019-15024</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2019-16535</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2019-18657</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2021-25263</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.4.6-all.jar (shaded: com.google.guava:guava:32.1.1) |
| CVE cannot take effect. |
| Already covered by PR https://github.com/apache/pulsar/pull/20699 |
| ]]></notes> |
| <sha1>d3b929509399a698915b24ff47db781d0c526760</sha1> |
| <cve>CVE-2023-2976</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: logback-core-1.1.3.jar |
| ]]></notes> |
| <sha1>e3c02049f2dbbc764681b40094ecf0dcbc99b157</sha1> |
| <cpe>cpe:/a:qos:logback</cpe> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: rocketmq-acl-4.5.2.jar |
| ]]></notes> |
| <sha1>0e2bd9c162280cd79c2ea0f67f174ee5d7b84ddd</sha1> |
| <cpe>cpe:/a:apache:rocketmq</cpe> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[Ignored since we are not vulnerable]]></notes> |
| <packageUrl regex="true">^pkg:maven/org\.springframework/spring.*$</packageUrl> |
| <cve>CVE-2016-1000027</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: logback-classic-1.1.3.jar |
| ]]></notes> |
| <sha1>d90276fff414f06cb375f2057f6778cd63c6082f</sha1> |
| <cpe>cpe:/a:qos:logback</cpe> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: logback-core-1.1.3.jar |
| ]]></notes> |
| <sha1>e3c02049f2dbbc764681b40094ecf0dcbc99b157</sha1> |
| <vulnerabilityName>CVE-2017-5929</vulnerabilityName> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: logback-classic-1.1.3.jar |
| ]]></notes> |
| <sha1>d90276fff414f06cb375f2057f6778cd63c6082f</sha1> |
| <cve>CVE-2017-5929</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: logback-classic-1.1.3.jar |
| ]]></notes> |
| <sha1>d90276fff414f06cb375f2057f6778cd63c6082f</sha1> |
| <cve>CVE-2021-42550</cve> |
| </suppress> |
| |
| <suppress> |
| <notes>Ignore etdc CVEs in jetcd</notes> |
| <filePath regex="true">.*jetcd.*</filePath> |
| <cpe>cpe:/a:etcd:etcd</cpe> |
| </suppress> |
| <suppress> |
| <notes>Ignore etdc CVEs in jetcd</notes> |
| <filePath regex="true">.*jetcd.*</filePath> |
| <cpe>cpe:/a:redhat:etcd</cpe> |
| </suppress> |
| <suppress> |
| <notes>Ignore grpc CVEs in jetcd</notes> |
| <filePath regex="true">.*jetcd-grpc.*</filePath> |
| <cpe>cpe:/a:grpc:grpc</cpe> |
| </suppress> |
| |
| <!-- bouncycastle misdetections --> |
| <suppress> |
| <notes><![CDATA[ |
| file name: bc-fips-1.0.2.jar |
| ]]></notes> |
| <sha1>4fb5db5f03d00f6a94e43b78d097978190e4abb2</sha1> |
| <cve>CVE-2020-26939</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: bcpkix-fips-1.0.2.jar |
| ]]></notes> |
| <sha1>543bc7a08cdba0172e95e536b5f7ca61f021253d</sha1> |
| <cve>CVE-2020-15522</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: bcpkix-fips-1.0.2.jar |
| ]]></notes> |
| <sha1>543bc7a08cdba0172e95e536b5f7ca61f021253d</sha1> |
| <cve>CVE-2020-26939</cve> |
| </suppress> |
| |
| <!-- jclouds/openswift misdetections --> |
| <suppress> |
| <notes><![CDATA[ |
| file name: openstack-swift-2.5.0.jar |
| ]]></notes> |
| <sha1>d99d0eab2e01d69d8a326fc152427fbd759af88a</sha1> |
| <cve>CVE-2016-0738</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: openstack-swift-2.5.0.jar |
| ]]></notes> |
| <sha1>d99d0eab2e01d69d8a326fc152427fbd759af88a</sha1> |
| <cve>CVE-2017-16613</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: openstack-keystone-2.5.0.jar |
| ]]></notes> |
| <sha1>a7e89bd278fa8be9fa604dda66d1606de5530797</sha1> |
| <cve>CVE-2018-14432</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: openstack-keystone-2.5.0.jar |
| ]]></notes> |
| <sha1>a7e89bd278fa8be9fa604dda66d1606de5530797</sha1> |
| <cve>CVE-2018-20170</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: openstack-keystone-2.5.0.jar |
| ]]></notes> |
| <sha1>a7e89bd278fa8be9fa604dda66d1606de5530797</sha1> |
| <cve>CVE-2020-12689</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: openstack-keystone-2.5.0.jar |
| ]]></notes> |
| <sha1>a7e89bd278fa8be9fa604dda66d1606de5530797</sha1> |
| <cve>CVE-2020-12690</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: openstack-keystone-2.5.0.jar |
| ]]></notes> |
| <sha1>a7e89bd278fa8be9fa604dda66d1606de5530797</sha1> |
| <cve>CVE-2020-12691</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: openstack-keystone-2.5.0.jar |
| ]]></notes> |
| <sha1>a7e89bd278fa8be9fa604dda66d1606de5530797</sha1> |
| <cve>CVE-2020-12692</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: openstack-keystone-2.5.0.jar |
| ]]></notes> |
| <sha1>a7e89bd278fa8be9fa604dda66d1606de5530797</sha1> |
| <cve>CVE-2021-3563</cve> |
| </suppress> |
| |
| <!-- Solr misdetection. |
| Cannot be tied to a sha1, |
| mismatches org.apache.pulsar:pulsar-io-solr:2.10.0-SNAPSHOT |
| --> |
| <suppress> |
| <notes><![CDATA[ |
| file name: org.apache.pulsar:pulsar-io-solr:2.10.0-SNAPSHOT |
| ]]></notes> |
| <packageUrl regex="true">^pkg:maven/org\.apache\.pulsar/pulsar\-io\-solr@.*-SNAPSHOT$</packageUrl> |
| <cpe>cpe:/a:apache:pulsar</cpe> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: org.apache.pulsar:pulsar-io-solr:2.10.0-SNAPSHOT |
| ]]></notes> |
| <packageUrl regex="true">^pkg:maven/org\.apache\.pulsar/pulsar\-io\-solr@.*-SNAPSHOT$</packageUrl> |
| <cpe>cpe:/a:apache:solr</cpe> |
| </suppress> |
| |
| <!-- debezium-related misdetections --> |
| <suppress> |
| <notes><![CDATA[ |
| file name: debezium-connector-mysql-1.9.7.Final.jar |
| ]]></notes> |
| <sha1>74c623b4a9b231e2f0e8f6053b38abd3bc487ce2</sha1> |
| <cve>CVE-2017-15945</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: mysql-binlog-connector-java-0.27.2.jar |
| ]]></notes> |
| <sha1>23294cd730e29c00b8ddfbde517dfc955aba090f</sha1> |
| <cve>CVE-2017-15945</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: debezium-connector-postgres-1.9.7.Final.jar |
| ]]></notes> |
| <sha1>300ff0bbf795643e914b7c8a6d6ba812a8354d62</sha1> |
| <cve>CVE-2015-0241</cve> |
| <cve>CVE-2015-0242</cve> |
| <cve>CVE-2015-0243</cve> |
| <cve>CVE-2015-0244</cve> |
| <cve>CVE-2015-3166</cve> |
| <cve>CVE-2015-3167</cve> |
| <cve>CVE-2016-0766</cve> |
| <cve>CVE-2016-0768</cve> |
| <cve>CVE-2016-0773</cve> |
| <cve>CVE-2016-5423</cve> |
| <cve>CVE-2016-5424</cve> |
| <cve>CVE-2016-7048</cve> |
| <cve>CVE-2017-14798</cve> |
| <cve>CVE-2017-7484</cve> |
| <cve>CVE-2018-1115</cve> |
| <cve>CVE-2019-10127</cve> |
| <cve>CVE-2019-10128</cve> |
| <cve>CVE-2019-10210</cve> |
| <cve>CVE-2019-10211</cve> |
| <cve>CVE-2020-25694</cve> |
| <cve>CVE-2020-25695</cve> |
| <cve>CVE-2021-23214</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: protostream-types-4.4.1.Final.jar |
| ]]></notes> |
| <sha1>29b45ebea1e4ce62ab3ec5eb76fa9771f98941b0</sha1> |
| <cve>CVE-2016-0750</cve> |
| <cve>CVE-2017-15089</cve> |
| <cve>CVE-2017-2638</cve> |
| <cve>CVE-2019-10158</cve> |
| <cve>CVE-2019-10174</cve> |
| <cve>CVE-2020-25711</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: mariadb-java-client-2.7.5.jar |
| ]]></notes> |
| <sha1>9dd29797ecabe7d2e7fa892ec6713a5552cfcc59</sha1> |
| <cve>CVE-2020-28912</cve> |
| <cve>CVE-2021-46669</cve> |
| <cve>CVE-2021-46666</cve> |
| <cve>CVE-2021-46667</cve> |
| </suppress> |
| <!-- only affects the server --> |
| <suppress> |
| <notes><![CDATA[ |
| file name: cassandra-driver-core-3.11.2.jar |
| ]]></notes> |
| <sha1>e0aad9f8611e710b9a0ce49747f7465ce07d8404</sha1> |
| <cve>CVE-2020-17516</cve> |
| <cve>CVE-2021-44521</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| The vulnerable method is deprecated in Guava, but isn't removed. It's necessary to suppress this CVE. |
| See https://github.com/google/guava/issues/4011 |
| ]]></notes> |
| <cve>CVE-2020-8908</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| This is a false positive in jackson-databind. |
| See https://github.com/FasterXML/jackson-databind/issues/3972#issuecomment-1596604021 |
| ]]></notes> |
| <cve>CVE-2023-35116</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| This is a false positive in avro-protobuf. The vulnerability is in Hamba avro golang library. |
| ]]></notes> |
| <cve>CVE-2023-37475</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| This CVE can be suppressed since it is covered in Pulsar by hostname verification changes made in https://github.com/apache/pulsar/pull/15824. |
| ]]></notes> |
| <cve>CVE-2023-4586</cve> |
| </suppress> |
| </suppressions> |