cyxu2 opened a new issue #6443: There are several CVEs in the project 
dependencies
URL: https://github.com/apache/pulsar/issues/6443
 
 
   I noticed some of your libraries contained CVEs. In order to avoid threats, 
I recommend updating to a safe version. Please look into the details below.
   * **Vulnerable Library Version:** org.apache.storm : storm-core : 2.0.0
     **CVE ID:** 
[CVE-2019-0202](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0202), 
[CVE-2018-11779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11779)
     **Import Path:** tests/pulsar-storm-test/pom.xml
     **Suggested Safe Versions:** 2.1.0
   * **Vulnerable Library Version:** com.fasterxml.jackson.datatype : 
jackson-datatype-jsr310 : 2.8.11
     **CVE ID:** 
[CVE-2018-1000873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000873)
     **Import Path:** pulsar-sql/presto-distribution/pom.xml
     **Suggested Safe Versions:** 2.10.0, 2.10.0.pr1, 2.10.0.pr2, 2.10.0.pr3, 
2.10.1, 2.10.2, 2.9.10, 2.9.8, 2.9.9
   * **Vulnerable Library Version:** org.eclipse.jetty : jetty-server : 
9.3.24.v20180605
     **CVE ID:** 
[CVE-2019-10247](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10247),
 [CVE-2017-7657](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7657), 
[CVE-2017-7658](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7658), 
[CVE-2017-7656](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7656)
     **Import Path:** tiered-storage/file-system/pom.xml
     **Suggested Safe Versions:** 10.0.0-alpha0, 10.0.0.alpha1, 
9.4.17.v20190418, 9.4.18.v20190429, 9.4.19.v20190610, 9.4.20.v20190813, 
9.4.24.v20191120, 9.4.25.v20191220, 9.4.26.v20200117
   * **Vulnerable Library Version:** org.eclipse.jetty : jetty-util : 
9.3.24.v20180605
     **CVE ID:** 
[CVE-2017-9735](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9735), 
[CVE-2019-10246](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10246),
 [CVE-2019-10241](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10241)
     **Import Path:** tiered-storage/file-system/pom.xml
     **Suggested Safe Versions:** 10.0.0-alpha0, 10.0.0.alpha1, 
9.4.17.v20190418, 9.4.18.v20190429, 9.4.19.v20190610, 9.4.20.v20190813, 
9.4.21.v20190926, 9.4.22.v20191022, 9.4.23.v20191118, 9.4.24.v20191120, 
9.4.25.v20191220, 9.4.26.v20200117
   * **Vulnerable Library Version:** com.google.guava : guava : 18.0
     **CVE ID:** 
[CVE-2018-10237](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10237)
     **Import Path:** pulsar-io/flume/pom.xml
     **Suggested Safe Versions:** 24.1.1-android, 24.1.1-jre, 25.0-android, 
25.0-jre, 25.1-android, 25.1-jre, 26.0-android, 26.0-jre, 27.0-android, 
27.0-jre, 27.0.1-android, 27.0.1-jre, 27.1-android, 27.1-jre, 28.0-android, 
28.0-jre, 28.1-android, 28.1-jre, 28.2-android, 28.2-jre
   * **Vulnerable Library Version:** org.apache.solr : solr-core : 7.5.0
     **CVE ID:** 
[CVE-2017-3164](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3164)
     **Import Path:** pulsar-io/solr/pom.xml
     **Suggested Safe Versions:** 7.7.0, 7.7.1, 7.7.2, 8.0.0, 8.1.0, 8.1.1, 
8.2.0, 8.3.0, 8.3.1, 8.4.0, 8.4.1
   * **Vulnerable Library Version:** mysql : mysql-connector-java : 8.0.11
     **CVE ID:** 
[CVE-2019-2692](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2692), 
[CVE-2018-3258](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3258)
     **Import Path:** tests/integration/pom.xml, pulsar-io/jdbc/pom.xml
     **Suggested Safe Versions:** 8.0.16, 8.0.17, 8.0.18, 8.0.19
   * **Vulnerable Library Version:** com.rabbitmq : amqp-client : 5.1.1
     **CVE ID:** 
[CVE-2018-11087](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11087)
     **Import Path:** tests/integration/pom.xml, pulsar-io/rabbitmq/pom.xml
     **Suggested Safe Versions:** 5.4.0, 5.4.1, 5.4.2, 5.4.3, 5.5.0, 5.5.1, 
5.5.2, 5.5.3, 5.6.0, 5.7.0, 5.7.1, 5.7.2, 5.7.3, 5.8.0
   * **Vulnerable Library Version:** org.apache.kafka : connect-runtime : 2.3.0
     **CVE ID:** 
[CVE-2019-12399](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12399)
     **Import Path:** pulsar-io/kafka-connect-adaptor/pom.xml, 
pulsar-io/debezium/core/pom.xml
     **Suggested Safe Versions:** 2.3.1, 2.4.0
   * **Vulnerable Library Version:** io.netty : netty-codec-http : 4.1.43.Final
     **CVE ID:** 
[CVE-2019-20444](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20444),
 [CVE-2020-7238](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7238), 
[CVE-2019-20445](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20445)
     **Import Path:** pulsar-client/pom.xml, pulsar-io/netty/pom.xml
     **Suggested Safe Versions:** 4.1.44.Final, 4.1.45.Final, 5.0.0.Alpha1, 
5.0.0.Alpha2
   * **Vulnerable Library Version:** com.fasterxml.jackson.core : 
jackson-databind : 2.9.7
     **CVE ID:** 
[CVE-2020-8840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8840), 
[CVE-2019-16335](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16335),
 
[CVE-2019-20330](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20330),
 
[CVE-2019-12384](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12384),
 
[CVE-2019-14439](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439),
 
[CVE-2018-19362](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362),
 
[CVE-2018-19361](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19361),
 
[CVE-2019-17531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531),
 
[CVE-2019-12086](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086),
 
[CVE-2019-12814](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12814),
 
[CVE-2019-16943](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943),
 
[CVE-2019-14379](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379),
 
[CVE-2019-14540](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540),
 
[CVE-2018-19360](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19360),
 
[CVE-2019-17267](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17267),
 [CVE-2019-16942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942)
     **Import Path:** pulsar-io/flume/pom.xml
     **Suggested Safe Versions:** 2.10.0, 2.10.1, 2.10.2, 2.9.10.3
   * **Vulnerable Library Version:** com.fasterxml.jackson.core : 
jackson-databind : 2.6.5
     **CVE ID:** 
[CVE-2017-17485](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17485),
 [CVE-2020-8840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8840), 
[CVE-2019-20330](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20330),
 
[CVE-2019-12384](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12384),
 
[CVE-2019-14439](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439),
 
[CVE-2018-19362](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362),
 
[CVE-2018-11307](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11307),
 
[CVE-2018-14721](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721),
 
[CVE-2018-14719](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14719),
 [CVE-2018-7489](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7489), 
[CVE-2019-17531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531),
 
[CVE-2019-12086](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086),
 
[CVE-2017-15095](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15095),
 
[CVE-2018-14718](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14718),
 
[CVE-2019-16943](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943),
 
[CVE-2019-12814](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12814),
 
[CVE-2018-19361](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19361),
 
[CVE-2018-19360](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19360),
 
[CVE-2018-14720](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14720),
 
[CVE-2019-16942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942),
 [CVE-2017-7525](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7525)
     **Import Path:** examples/spark/pom.xml
     **Suggested Safe Versions:** 2.10.0, 2.10.1, 2.10.2, 2.9.10.3
   * **Vulnerable Library Version:** com.fasterxml.jackson.core : 
jackson-databind : 2.8.11.4
     **CVE ID:** 
[CVE-2020-8840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8840), 
[CVE-2019-16335](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16335),
 
[CVE-2019-20330](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20330),
 
[CVE-2019-12384](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12384),
 
[CVE-2018-19362](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362),
 
[CVE-2019-16943](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943),
 
[CVE-2019-17531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531),
 
[CVE-2019-12086](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086),
 
[CVE-2019-12814](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12814),
 
[CVE-2018-19361](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19361),
 
[CVE-2019-14379](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379),
 
[CVE-2019-14540](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540),
 
[CVE-2019-17267](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17267),
 [CVE-2019-16942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942)
     **Import Path:** pulsar-sql/presto-distribution/pom.xml
     **Suggested Safe Versions:** 2.10.0, 2.10.1, 2.10.2, 2.9.10.3
   

----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
[email protected]


With regards,
Apache Git Services

Reply via email to