Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Suppress CVE's in master #15231

Merged
merged 3 commits into from
Oct 27, 2023
Merged

Conversation

LakshSingla
Copy link
Contributor

This PR suppresses the following CVE's

  • CVE-2023-44487 - Suppressing the CVE since it hasn't been fixed in the latest version of Hadoop
  • CVE-2020-28458 - Pretty old CVE that was suppressed using <vulnerabilityName> already, however, it was popping up while trying to build the artifact.
  • CVE-2023-5072 - Affects json-java that neither Druid nor any of its dependency is using (verified using mvn dependency:tree. False positive, looks like the CPE identifier is too generic that it is flagging JARs with json- in their name
  • CVE-2023-44981 - Genuine CVE, this should be resolved once we upgrade ZK, since the ZK version Druid is using doesn't have a patch for this CVE. This seems to affect ZK servers, and Druid uses that in quickstart/docker-compose. In production, users are supposed to use their own ZK (containing a later & patched version of ZK), with which the client libraries Druid is using would be compatible.

@LakshSingla LakshSingla added this to the 28.0 milestone Oct 25, 2023
<!-- CVE-2023-5072 has a too broad CPE that flags all versions of json-java - https://github.com/jeremylong/DependencyCheck/issues/5991 -->
<suppress base="true">
<notes><![CDATA[
FP per issue #5991
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

what does this mean? What issue does it refer to?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is picked up from a description in https://github.com/jeremylong/DependencyCheck which suppresses it. There's another suppression in the suppression file here which also does the same, so I assumed that it's standard to add it in the notes.
I'll clean up the suppression.

@@ -811,4 +813,25 @@
<packageUrl regex="true">^pkg:maven/org\.codehaus\.plexus/plexus-interpolation@.*$</packageUrl>
<cve>CVE-2022-4244</cve>
</suppress>

<!-- CVE-2023-5072 has a too broad CPE that flags all versions of json-java - https://github.com/jeremylong/DependencyCheck/issues/5991 -->
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we don't use json-java at all. "flags all versions of json-java" text seems unrelated to why we are suppressing it.

Comment on lines +825 to +829
<!--
~ CVE-2023-44981 seems to affect Zookeeper servers. While we ship with a previous version of the Zookeeper, Druid only
~ only uses the client classes of the Zookeeper. We do use the older version in the quickstart & example docker file,
~ however in production it is recomended to use your own Zookeeper server with the CVE patched up, which the Druid's
~ older ZK library is still compatible with.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

@LakshSingla
Copy link
Contributor Author

Cleaned up the CVE notes and addressed the comments

@LakshSingla
Copy link
Contributor Author

LakshSingla commented Oct 27, 2023

Thanks @abhishekagarwal87 for the review.

@LakshSingla LakshSingla merged commit 7c8e841 into apache:master Oct 27, 2023
88 checks passed
@LakshSingla LakshSingla deleted the cve-supress-231023 branch October 27, 2023 03:59
LakshSingla added a commit to LakshSingla/druid that referenced this pull request Oct 27, 2023
cryptoe pushed a commit that referenced this pull request Oct 27, 2023
CaseyPan pushed a commit to CaseyPan/druid that referenced this pull request Nov 17, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants