mirror of https://github.com/apache/druid.git
Suppress CVEs (#14291)
Address various CVEs by upgrading dependencies or adding suppression with a justification
This commit is contained in:
parent
58a35bf07e
commit
c3f84f9ea0
|
@ -27,7 +27,7 @@ on:
|
|||
|
||||
jobs:
|
||||
build:
|
||||
if: github.event_name == 'schedule'
|
||||
if: (github.event_name == 'schedule' && github.repository == 'apache/druid')
|
||||
name: build (jdk8)
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
|
@ -107,10 +107,12 @@ jobs:
|
|||
group: other
|
||||
|
||||
security_vulnerabilities:
|
||||
if: github.repository == 'apache/druid'
|
||||
name: security vulnerabilities
|
||||
strategy:
|
||||
fail-fast: false
|
||||
matrix:
|
||||
HADOOP_PROFILE: [ '', '-Phadoop3' ]
|
||||
HADOOP_PROFILE: [ '', '-Phadoop2' ]
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- name: Checkout branch
|
||||
|
@ -123,9 +125,11 @@ jobs:
|
|||
distribution: 'zulu'
|
||||
cache: maven
|
||||
|
||||
- name: maven build # needed to rebuild incase of maven snapshot resolution fails
|
||||
run: mvn clean install dependency:go-offline -P dist -P skip-static-checks,skip-tests -Dmaven.javadoc.skip=true -Dcyclonedx.skip=true -Dweb.console.skip=true
|
||||
|
||||
- name: security vulnerabilities check
|
||||
env:
|
||||
MVN: mvn --no-snapshot-updates
|
||||
HADOOP_PROFILE: ${{ matrix.HADOOP_PROFILE }}
|
||||
run: |
|
||||
mvn dependency-check:purge dependency-check:check ${HADOOP_PROFILE} || { echo "
|
||||
|
|
|
@ -122,6 +122,8 @@
|
|||
https://github.com/FasterXML/jackson-databind/issues/3328
|
||||
-->
|
||||
<cve>CVE-2021-46877</cve>
|
||||
<!-- According to jackson community, this is not a security issue, see https://github.com/FasterXML/jackson-databind/issues/3972#issuecomment-1596193098, https://github.com/jeremylong/DependencyCheck/issues/5779 -->
|
||||
<cve>CVE-2023-35116</cve>
|
||||
</suppress>
|
||||
|
||||
|
||||
|
@ -192,10 +194,14 @@
|
|||
~ ... 27 more
|
||||
-->
|
||||
<notes><![CDATA[
|
||||
file name: hibernate-validator-5.3.6.Final.jar
|
||||
file name: hibernate-validator-5.2.5.Final.jar
|
||||
]]></notes>
|
||||
<packageUrl regex="true">^pkg:maven/org\.hibernate/hibernate\-validator@.*$</packageUrl>
|
||||
<cve>CVE-2017-7536</cve>
|
||||
<cve>CVE-2019-10219</cve> <!-- We don't use SafeHtml validator annotation https://nvd.nist.gov/vuln/detail/CVE-2019-10219 -->
|
||||
<cve>CVE-2019-14900</cve> <!-- Not applicable to hibernate validator https://github.com/hibernate/hibernate-orm/pull/3438 -->
|
||||
<cve>CVE-2020-10693</cve> <!-- We don't take user input in constraint violation message https://hibernate.atlassian.net/browse/HV-1774 -->
|
||||
<cve>CVE-2020-25638</cve>
|
||||
</suppress>
|
||||
<suppress>
|
||||
|
@ -216,8 +222,13 @@
|
|||
<cve>CVE-2019-20444</cve>
|
||||
<cve>CVE-2019-20445</cve>
|
||||
<cve>CVE-2020-11612</cve>
|
||||
<cve>CVE-2021-21290</cve> <!-- We don't use HttpPostRequestDecoder or HttpPostMultiPartRequestDecoder which uses vulnerable AbstractDiskHttpData - https://github.com/advisories/GHSA-5mcr-gq6c-3hq2 -->
|
||||
<cve>CVE-2021-21295</cve> <!-- We don't use HTTP2MultiplexCodec or Http2FrameCodec or Http2StreamFrameToHttpObjectCodec affected or convert HTTP/2 to HTTP/1.1 requests - https://github.com/advisories/GHSA-wm47-8v5p-wjpj -->
|
||||
<cve>CVE-2021-21409</cve> <!-- We don't use Http2HeaderFrame or convert HTTP/2 to HTTP/1.1 requests https://github.com/advisories/GHSA-f256-j965-7f32 -->
|
||||
<cve>CVE-2021-37136</cve>
|
||||
<cve>CVE-2021-37137</cve>
|
||||
<cve>CVE-2021-43797</cve> <!-- We don't decode user HTTP requests nor forward them to remote systems, we also don't support for java 6 or lower - https://github.com/advisories/GHSA-wx5j-54mm-rqqq -->
|
||||
<cve>CVE-2022-24823</cve> <!-- We don't decode user HTTP requests nor forward them to remote systems, we also don't support for java 6 or lower - https://github.com/advisories/GHSA-269q-hmxg-m83q -->
|
||||
<cve>CVE-2022-41881</cve>
|
||||
</suppress>
|
||||
<suppress>
|
||||
|
@ -799,6 +810,14 @@
|
|||
<cve>CVE-2022-26612</cve>
|
||||
<!-- this one seems to apply to backend server - https://nvd.nist.gov/vuln/detail/CVE-2023-25613 -->
|
||||
<cve>CVE-2023-25613</cve>
|
||||
<cve>CVE-2023-2976</cve> <!-- hadoop-client-runtime isn't using com.google.common.io.FileBackedOutputStream -->
|
||||
</suppress>
|
||||
<suppress>
|
||||
<!-- from extensions using hadoop-client-api, these dependencies are shaded in the jar -->
|
||||
<notes><![CDATA[
|
||||
file name: hadoop-client-api-3.3.6.jar: jquery.dataTables.min.js (pkg:javascript/jquery.datatables@1.10.18)
|
||||
]]></notes>
|
||||
<vulnerabilityName>prototype pollution</vulnerabilityName>
|
||||
</suppress>
|
||||
<suppress>
|
||||
<notes><![CDATA[
|
||||
|
@ -808,4 +827,28 @@
|
|||
<!-- applies to ranger-hive-plugin which afaict we do not use https://nvd.nist.gov/vuln/detail/CVE-2021-40331 -->
|
||||
<cve>CVE-2021-40331</cve>
|
||||
</suppress>
|
||||
|
||||
<!-- filed against random script set, doesn't apply to any Maven artifacts - https://github.com/jeremylong/DependencyCheck/issues/5213 -->
|
||||
<suppress>
|
||||
<notes><![CDATA[
|
||||
file name: plexus-utils-3.0.24.jar
|
||||
file name: async-http-client-netty-utils-2.5.3.jar
|
||||
]]></notes>
|
||||
<packageUrl regex="true">^pkg:maven/.*/.*@.*$</packageUrl>
|
||||
<cve>CVE-2021-4277</cve>
|
||||
</suppress>
|
||||
|
||||
<suppress>
|
||||
<notes><![CDATA[
|
||||
file name: guava-16.0.1.jar
|
||||
]]></notes>
|
||||
<packageUrl regex="true">^pkg:maven/com\.google\.guava/guava@16.0.1$</packageUrl>
|
||||
<!--
|
||||
~ We don't either use AtomicDoubleArray (when serialized with Java serialization) or
|
||||
~ CompoundOrdering (when serialized with GWT serialization) nor do we use Java or GWT serialization. https://nvd.nist.gov/vuln/detail/cve-2018-10237
|
||||
-->
|
||||
<cve>CVE-2018-10237</cve>
|
||||
<cve>CVE-2020-8908</cve> <!-- We do not use com.google.common.io.Files.createTempDir() https://nvd.nist.gov/vuln/detail/CVE-2020-8908 -->
|
||||
<cve>CVE-2023-2976</cve> <!-- We do not use com.google.common.io.FileBackedOutputStream https://nvd.nist.gov/vuln/detail/CVE-2023-2976 -->
|
||||
</suppress>
|
||||
</suppressions>
|
||||
|
|
Loading…
Reference in New Issue