You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@pulsar.apache.org by GitBox <gi...@apache.org> on 2022/06/17 15:23:28 UTC

[GitHub] [pulsar] nicoloboschi commented on a diff in pull request #16110: [security] Suppress CVE-2022-23712 warnings

nicoloboschi commented on code in PR #16110:
URL: https://github.com/apache/pulsar/pull/16110#discussion_r900226700


##########
src/owasp-dependency-check-suppressions.xml:
##########
@@ -37,7 +37,19 @@
         <vulnerabilityName regex="true">.*</vulnerabilityName>
     </suppress>
 
-    <!-- see https://github.com/apache/pulsar/pull/14629-->
+    <!-- see https://github.com/apache/pulsar/pull/16110 -->
+    <suppress>
+        <notes>CVE-2022-23712 is only related to Elastic server</notes>
+        <gav>co.elastic.clients:elasticsearch-java:8.1.0</gav>
+        <cve>CVE-2022-23712</cve>
+    </suppress>
+    <suppress>
+        <notes>CVE-2022-23712 is only related to Elastic server</notes>
+        <gav>org.elasticsearch.client:elasticsearch-rest-client:8.1.0</gav>

Review Comment:
   could you use the sha1 here? 



##########
src/owasp-dependency-check-suppressions.xml:
##########
@@ -37,7 +37,19 @@
         <vulnerabilityName regex="true">.*</vulnerabilityName>
     </suppress>
 
-    <!-- see https://github.com/apache/pulsar/pull/14629-->
+    <!-- see https://github.com/apache/pulsar/pull/16110 -->
+    <suppress>
+        <notes>CVE-2022-23712 is only related to Elastic server</notes>
+        <gav>co.elastic.clients:elasticsearch-java:8.1.0</gav>

Review Comment:
   could you use the sha1 here? 



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscribe@pulsar.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org