Path: blob/main/databases/cassandra4/files/maven/dependency-check-suppressions.xml
46786 views
<!--1~ Licensed to the Apache Software Foundation (ASF) under one2~ or more contributor license agreements. See the NOTICE file3~ distributed with this work for additional information4~ regarding copyright ownership. The ASF licenses this file5~ to you under the Apache License, Version 2.0 (the6~ "License"); you may not use this file except in compliance7~ with the License. You may obtain a copy of the License at8~9~ http://www.apache.org/licenses/LICENSE-2.010~11~ Unless required by applicable law or agreed to in writing, software12~ distributed under the License is distributed on an "AS IS" BASIS,13~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.14~ See the License for the specific language governing permissions and15~ limitations under the License.16-->17<!--18copy suppressions / false positives here if there are any, how to do it is explained in19https://jeremylong.github.io/DependencyCheck/general/suppression.html20-->21<suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">22<suppress>23<!-- https://issues.apache.org/jira/browse/CASSANDRA-17907 -->24<packageUrl regex="true">^pkg:maven/org\.yaml/snakeyaml@.*$</packageUrl>25<cve>CVE-2022-1471</cve>26<cve>CVE-2022-25857</cve>27<cve>CVE-2022-38749</cve>28<cve>CVE-2022-38750</cve>29<cve>CVE-2022-38751</cve>30<cve>CVE-2022-38752</cve>31<cve>CVE-2022-41854</cve>32</suppress>33<suppress>34<!-- not applicable https://nvd.nist.gov/vuln/detail/CVE-2020-8908 -->35<packageUrl regex="true">^pkg:maven/com\.google\.guava/guava@.*$</packageUrl>36<cve>CVE-2020-8908</cve>37<cve>CVE-2023-2976</cve>38</suppress>39<!-- netty's http stuff is not applicable here -->40<suppress>41<packageUrl regex="true">^pkg:maven/io\.netty/netty\-.*@.*$</packageUrl>42<cve>CVE-2021-21290</cve>43<cve>CVE-2021-21295</cve>44<cve>CVE-2021-21409</cve>45<cve>CVE-2022-24823</cve>46<cve>CVE-2025-24970</cve>47<cve>CVE-2025-25193</cve>48<cve>CVE-2024-29025</cve>49<cve>CVE-2023-34462</cve>50<cve>CVE-2021-37136</cve>51<cve>CVE-2021-37137</cve>52<cve>CVE-2022-41881</cve>53<cve>CVE-2021-43797</cve>54<cve>CVE-2023-44487</cve>55<cve>CVE-2024-47535</cve>56<cve>CVE-2025-55163</cve>57<cve>CVE-2025-58056</cve>58<cve>CVE-2025-58057</cve>59</suppress>6061<!-- https://issues.apache.org/jira/browse/CASSANDRA-19142 -->62<!-- https://issues.apache.org/jira/browse/CASSANDRA-20412 -->63<suppress>64<packageUrl regex="true">^pkg:maven/ch\.qos\.logback/logback\-core@.*$</packageUrl>65<cve>CVE-2023-6378</cve>66<cve>CVE-2024-12798</cve>67<cve>CVE-2024-12801</cve>68</suppress>69<suppress>70<packageUrl regex="true">^pkg:maven/ch\.qos\.logback/logback\-classic@.*$</packageUrl>71<cve>CVE-2023-6378</cve>72<cve>CVE-2024-12798</cve>73<cve>CVE-2024-12801</cve>74</suppress>75</suppressions>767778