| <?xml version="1.0" encoding="UTF-8"?> |
| <!-- |
| |
| Licensed to the Apache Software Foundation (ASF) under one |
| or more contributor license agreements. See the NOTICE file |
| distributed with this work for additional information |
| regarding copyright ownership. The ASF licenses this file |
| to you under the Apache License, Version 2.0 (the |
| "License"); you may not use this file except in compliance |
| with the License. You may obtain a copy of the License at |
| |
| http://www.apache.org/licenses/LICENSE-2.0 |
| |
| Unless required by applicable law or agreed to in writing, |
| software distributed under the License is distributed on an |
| "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| KIND, either express or implied. See the License for the |
| specific language governing permissions and limitations |
| under the License. |
| |
| --> |
| <suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd"> |
| <!-- add supressions for known vulnerabilities detected by OWASP Dependency Check --> |
| <suppress> |
| <notes>Ignore netty CVEs in GRPC shaded Netty.</notes> |
| <filePath regex="true">.*grpc-netty-shaded.*</filePath> |
| <cpe>cpe:/a:netty:netty</cpe> |
| </suppress> |
| <suppress> |
| <notes>Suppress all pulsar-presto-distribution vulnerabilities</notes> |
| <filePath regex="true">.*pulsar-presto-distribution-.*</filePath> |
| <vulnerabilityName regex="true">.*</vulnerabilityName> |
| </suppress> |
| <suppress> |
| <notes>Suppress libthrift-0.12.0.jar vulnerabilities</notes> |
| <gav>org.apache.thrift:libthrift:0.12.0</gav> |
| <vulnerabilityName regex="true">.*</vulnerabilityName> |
| </suppress> |
| <suppress> |
| <notes>Suppress Zookeeper 3.6.2 vulnerabilities</notes> |
| <gav regex="true">org\.apache\.zookeeper:.*:3\.6\.2</gav> |
| <vulnerabilityName regex="true">.*</vulnerabilityName> |
| </suppress> |
| |
| <!-- see https://github.com/alibaba/canal/issues/4010 --> |
| <suppress> |
| <notes><![CDATA[ |
| file name: canal.client-1.1.5.jar (shaded: com.google.guava:guava:22.0) |
| ]]></notes> |
| <sha1>b87878db57d5cfc2ca7d3972cc8f7486bf02fbca</sha1> |
| <cve>CVE-2018-10237</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: canal.client-1.1.5.jar (shaded: com.google.guava:guava:22.0) |
| ]]></notes> |
| <sha1>b87878db57d5cfc2ca7d3972cc8f7486bf02fbca</sha1> |
| <cve>CVE-2020-8908</cve> |
| </suppress> |
| |
| <!-- clickhouse: security scan matches client lib to the server CVEs --> |
| <suppress> |
| <notes><![CDATA[ |
| file name: avro-1.10.2.jar |
| ]]></notes> |
| <sha1>a65aaa91c1aeceb3dd4859dbb9765d1c2063f5a2</sha1> |
| <cve>CVE-2021-43045</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2018-14668</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2018-14669</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2018-14670</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2018-14671</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2018-14672</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2019-15024</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2019-16535</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2019-18657</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: clickhouse-jdbc-0.3.2.jar |
| ]]></notes> |
| <sha1>fa9a1ccda7d78edb51a3a33d3493566092786a30</sha1> |
| <cve>CVE-2021-25263</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: logback-core-1.1.3.jar |
| ]]></notes> |
| <sha1>e3c02049f2dbbc764681b40094ecf0dcbc99b157</sha1> |
| <cpe>cpe:/a:qos:logback</cpe> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: rocketmq-acl-4.5.2.jar |
| ]]></notes> |
| <sha1>0e2bd9c162280cd79c2ea0f67f174ee5d7b84ddd</sha1> |
| <cpe>cpe:/a:apache:rocketmq</cpe> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: spring-core-3.2.18.RELEASE.jar |
| ]]></notes> |
| <sha1>0e2bd9c162280cd79c2ea0f67f174ee5d7b84ddd</sha1> |
| <cpe>cpe:/a:pivotal_software:spring_framework</cpe> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: spring-core-3.2.18.RELEASE.jar |
| ]]></notes> |
| <sha1>0e2bd9c162280cd79c2ea0f67f174ee5d7b84ddd</sha1> |
| <cpe>cpe:/a:springsource:spring_framework</cpe> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: spring-core-3.2.18.RELEASE.jar |
| ]]></notes> |
| <sha1>0e2bd9c162280cd79c2ea0f67f174ee5d7b84ddd</sha1> |
| <cpe>cpe:/a:vmware:spring_framework</cpe> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: spring-core-3.2.18.RELEASE.jar |
| ]]></notes> |
| <sha1>0e2bd9c162280cd79c2ea0f67f174ee5d7b84ddd</sha1> |
| <cpe>cpe:/a:vmware:springsource_spring_framework</cpe> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: logback-classic-1.1.3.jar |
| ]]></notes> |
| <sha1>d90276fff414f06cb375f2057f6778cd63c6082f</sha1> |
| <cpe>cpe:/a:qos:logback</cpe> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: logback-core-1.1.3.jar |
| ]]></notes> |
| <sha1>e3c02049f2dbbc764681b40094ecf0dcbc99b157</sha1> |
| <vulnerabilityName>CVE-2017-5929</vulnerabilityName> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: logback-classic-1.1.3.jar |
| ]]></notes> |
| <sha1>d90276fff414f06cb375f2057f6778cd63c6082f</sha1> |
| <cve>CVE-2017-5929</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ |
| file name: logback-classic-1.1.3.jar |
| ]]></notes> |
| <sha1>d90276fff414f06cb375f2057f6778cd63c6082f</sha1> |
| <cve>CVE-2021-42550</cve> |
| </suppress> |
| </suppressions> |