streamnative / kop

Kafka-on-Pulsar - A protocol handler that brings native Kafka protocol to Apache Pulsar
https://streamnative.io/docs/kop
Apache License 2.0
447 stars 132 forks source link

[Snyk] Security upgrade io.streamnative:pulsar-broker from 3.0.0.1 to v2.8.0-rc-202106091140 #2011

Closed BewareMyPower closed 9 months ago

BewareMyPower commented 9 months ago

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

#### Changes included in this PR - Changes to the following files to upgrade the vulnerable dependencies to a fixed version: - pom.xml #### Vulnerabilities that will be fixed ##### With an upgrade: Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png "low severity") | **379/1000**
**Why?** Has a fix available, CVSS 3.3 | Creation of Temporary File in Directory with Insecure Permissions
[SNYK-JAVA-COMGOOGLEGUAVA-5710356](https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-5710356) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> v2.8.0-rc-202106091140`
| Yes | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **505/1000**
**Why?** Has a fix available, CVSS 5.6 | Improper Certificate Validation
[SNYK-JAVA-IONETTY-1042268](https://snyk.io/vuln/SNYK-JAVA-IONETTY-1042268) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> v2.8.0-rc-202106091140`
| Yes | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **449/1000**
**Why?** Has a fix available, CVSS 4.7 | Information Exposure
[SNYK-JAVA-ORGBOUNCYCASTLE-5771339](https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-5771339) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> v2.8.0-rc-202106091140`
| No | No Known Exploit ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **768/1000**
**Why?** Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 7.5 | Allocation of Resources Without Limits or Throttling
[SNYK-JAVA-ORGXERIALSNAPPY-5918282](https://snyk.io/vuln/SNYK-JAVA-ORGXERIALSNAPPY-5918282) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> v2.8.0-rc-202106091140`
| Yes | Proof of Concept (*) Note that the real score may have changed since the PR was raised. Check the changes in this PR to ensure they won't cause issues with your project. ------------ **Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.* For more information: 🧐 [View latest project report](https://app.snyk.io/org/bewaremypower/project/bd7c520b-6023-4914-b411-143ede768277?utm_source=github&utm_medium=referral&page=fix-pr) 🛠 [Adjust project settings](https://app.snyk.io/org/bewaremypower/project/bd7c520b-6023-4914-b411-143ede768277?utm_source=github&utm_medium=referral&page=fix-pr/settings) 📚 [Read more about Snyk's upgrade and patch logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) [//]: # (snyk:metadata:{"prId":"c6397730-7302-4793-9700-654300abc7e6","prPublicId":"c6397730-7302-4793-9700-654300abc7e6","dependencies":[{"name":"io.streamnative:pulsar-broker","from":"3.0.0.1","to":"v2.8.0-rc-202106091140"}],"packageManager":"maven","projectPublicId":"bd7c520b-6023-4914-b411-143ede768277","projectUrl":"https://app.snyk.io/org/bewaremypower/project/bd7c520b-6023-4914-b411-143ede768277?utm_source=github&utm_medium=referral&page=fix-pr","type":"auto","patch":[],"vulns":["SNYK-JAVA-COMGOOGLEGUAVA-5710356","SNYK-JAVA-IONETTY-1042268","SNYK-JAVA-ORGBOUNCYCASTLE-5771339","SNYK-JAVA-ORGXERIALSNAPPY-5918282"],"upgrade":["SNYK-JAVA-COMGOOGLEGUAVA-5710356","SNYK-JAVA-IONETTY-1042268","SNYK-JAVA-ORGBOUNCYCASTLE-5771339","SNYK-JAVA-ORGXERIALSNAPPY-5918282"],"isBreakingChange":true,"env":"prod","prType":"fix","templateVariants":["updated-fix-title","priorityScore"],"priorityScoreList":[379,505,449,768],"remediationStrategy":"vuln"}) --- **Learn how to fix vulnerabilities with free interactive lessons:** 🦉 [Creation of Temporary File in Directory with Insecure Permissions](https://learn.snyk.io/lesson/insecure-temporary-file/?loc=fix-pr) 🦉 [Allocation of Resources Without Limits or Throttling](https://learn.snyk.io/lesson/no-rate-limiting/?loc=fix-pr)
CLAassistant commented 9 months ago

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.

github-actions[bot] commented 9 months ago

@BewareMyPower:Thanks for your contribution. For this PR, do we need to update docs? (The PR template contains info about doc, which helps others know more about the changes. Can you provide doc-related info in this and future PR descriptions? Thanks)