This is an automated email from the ASF dual-hosted git repository.

abhishek pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/druid.git


The following commit(s) were added to refs/heads/master by this push:
     new a469c53c0c8 cleanup already resolved CVEs (#15447)
a469c53c0c8 is described below

commit a469c53c0c8bc96171eb27eeda50fdcfc380ea27
Author: Jan Werner <[email protected]>
AuthorDate: Tue Dec 5 00:00:35 2023 -0500

    cleanup already resolved CVEs (#15447)
    
    Remove the crud from the dependency-check suppression file
---
 owasp-dependency-check-suppressions.xml | 882 +++++++++++++-------------------
 1 file changed, 349 insertions(+), 533 deletions(-)

diff --git a/owasp-dependency-check-suppressions.xml 
b/owasp-dependency-check-suppressions.xml
index b4be731ec05..421cb9df6ef 100644
--- a/owasp-dependency-check-suppressions.xml
+++ b/owasp-dependency-check-suppressions.xml
@@ -18,457 +18,139 @@
   ~ under the License.
   -->
 <suppressions 
xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd";>
+  <!-- False positives -->
   <suppress>
-    <!-- druid-indexing-hadoop.jar is mistaken for hadoop -->
     <notes><![CDATA[
-   file name: org.apache.druid:druid-indexing-hadoop
-   ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.apache\.druid/druid\-indexing\-hadoop@.*$</packageUrl>
-    <cve>CVE-2012-4449</cve>
-    <cve>CVE-2017-3162</cve>
-    <cve>CVE-2018-8009</cve>
-    <cve>CVE-2022-26612</cve>
-  </suppress>
-  <suppress>
-    <!-- druid-processing.jar is mistaken for org.processing:processing -->
-    <notes><![CDATA[
-   file name: org.apache.druid:druid-processing
-   ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.apache\.druid/druid\-processing@.*$</packageUrl>
-    <cve>CVE-2018-1000840</cve>
-  </suppress>
-  <suppress>
-    <!-- These CVEs are for the python SDK, but Druid uses the Java SDK -->
-    <notes><![CDATA[
-   file name: openstack-swift
-   ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.apache\.jclouds\.api/openstack\-swift@.*$</packageUrl>
-    <cve>CVE-2013-7109</cve>
-    <cve>CVE-2016-0737</cve>
-    <cve>CVE-2016-0738</cve>
-    <cve>CVE-2017-16613</cve>
-  </suppress>
-  <suppress>
-    <notes><![CDATA[
-   file name: openstack-keystone-1.9.1.jar
-   ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.apache\.jclouds\.api/openstack\-keystone@.*$</packageUrl>
-    <!-- These CVEs are for the python SDK, but Druid uses the Java SDK -->
-    <cve>CVE-2015-7546</cve>
-    <cve>CVE-2020-12689</cve>
-    <cve>CVE-2020-12690</cve>
-    <cve>CVE-2020-12691</cve>
-
-    <!-- This CVE affects the server -->
-    <cve>CVE-2021-3563</cve>
+     file name: json-path-2.3.0.jar jackson-core-2.12.7.jar
+     ]]></notes>
+    <cve>CVE-2022-45688</cve>
+    <cve>CVE-2023-35116</cve>
   </suppress>
 
   <suppress>
     <notes><![CDATA[
-     file name: json-path-2.3.0.jar
-     ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/net\.minidev/json\-path@.*$</packageUrl>
-    <cve>CVE-2022-45688</cve>
+      file name: grpc-context-1.27.2.jar
+    ]]></notes>
+    <packageUrl 
regex="true">^pkg:maven/io\.grpc/[email protected]$</packageUrl>
+    <cve>CVE-2023-4785</cve> <!-- Not applicable to gRPC Java - 
https://nvd.nist.gov/vuln/detail/CVE-2023-4785 -->
+    <cve>CVE-2023-33953</cve> <!-- Not applicable to gRPC Java - 
https://cloud.google.com/support/bulletins#gcp-2023-022 -->
+    <cve>CVE-2023-32732</cve>
   </suppress>
 
   <suppress>
     <!-- Pulled in by io.kubernetes:client-java and kafka_2.13 but not fixed 
in either place yet -->
     <!-- jose4j before v0.9.3 allows attackers to set a low iteration count of 
1000 or less -->
     <notes><![CDATA[
-    file name: jose4j-0.7.3.jar
+      file name: commons-compress-1.23.0.jar
     ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.bitbucket\.b_c/jose4j@.*$</packageUrl>
-    <cve>CVE-2023-31582</cve>
+    <cve>CVE-2023-42503</cve>
   </suppress>
 
   <suppress>
-    <!-- Not much for us to do as a user of the client lib, and no patch is 
available,
-     see https://github.com/kubernetes/kubernetes/issues/97076 -->
     <notes><![CDATA[
-   file name: client-java-10.0.1.jar
-   ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/io\.kubernetes/client\-java.*@10.0.1$</packageUrl>
-    <cve>CVE-2020-8554</cve>
+      file name: guava-31.1-jre.jar
+    ]]></notes>
+    <cve>CVE-2020-8908</cve>
   </suppress>
 
-  <!-- FIXME: These are suppressed so that CI can enforce that no new 
vulnerable dependencies are added. -->
-  <suppress>
-    <!--
-      ~ TODO: Fix by updating hibernate-validator.
-
-      ~ Note hibernate-validator:5.3.1 introduces a change that requires an EL 
implementation to be in the classpath:
-      ~ 
https://developer.jboss.org/wiki/HibernateValidatorMigrationGuide#jive_content_id_531Final
-      ~
-      ~ For example, updating hibernate-validator causes hadoop ingestion 
tasks to fail:
-      ~
-      ~   Error: com.google.inject.CreationException: Unable to create 
injector, see the following errors:
-      ~
-      ~   1) An exception was caught and reported. Message: HV000183: Unable 
to initialize 'javax.el.ExpressionFactory'. Check that you have the EL 
dependencies on the classpath, or use ParameterMessageInterpolator instead
-      ~     at 
com.google.inject.internal.InjectorShell$Builder.build(InjectorShell.java:138)
-      ~
-      ~   2) No implementation for javax.validation.Validator was bound.
-      ~     at 
org.apache.druid.guice.ConfigModule.configure(ConfigModule.java:39)
-      ~
-      ~   2 errors
-      ~       at 
com.google.inject.internal.Errors.throwCreationExceptionIfErrorsExist(Errors.java:470)
-      ~       at 
com.google.inject.internal.InternalInjectorCreator.initializeStatically(InternalInjectorCreator.java:155)
-      ~       at 
com.google.inject.internal.InternalInjectorCreator.build(InternalInjectorCreator.java:107)
-      ~       at com.google.inject.Guice.createInjector(Guice.java:99)
-      ~       at com.google.inject.Guice.createInjector(Guice.java:73)
-      ~       at 
org.apache.druid.guice.GuiceInjectors.makeStartupInjector(GuiceInjectors.java:56)
-      ~       at 
org.apache.druid.indexer.HadoopDruidIndexerConfig.<clinit>(HadoopDruidIndexerConfig.java:102)
-      ~       at 
org.apache.druid.indexer.HadoopDruidIndexerMapper.setup(HadoopDruidIndexerMapper.java:53)
-      ~       at 
org.apache.druid.indexer.DetermineHashedPartitionsJob$DetermineCardinalityMapper.setup(DetermineHashedPartitionsJob.java:279)
-      ~       at 
org.apache.druid.indexer.DetermineHashedPartitionsJob$DetermineCardinalityMapper.run(DetermineHashedPartitionsJob.java:334)
-      ~       at 
org.apache.hadoop.mapred.MapTask.runNewMapper(MapTask.java:787)
-      ~       at org.apache.hadoop.mapred.MapTask.run(MapTask.java:341)
-      ~       at org.apache.hadoop.mapred.YarnChild$2.run(YarnChild.java:175)
-      ~       at java.security.AccessController.doPrivileged(Native Method)
-      ~       at javax.security.auth.Subject.doAs(Subject.java:422)
-      ~       at 
org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1844)
-      ~       at org.apache.hadoop.mapred.YarnChild.main(YarnChild.java:169)
-      ~   Caused by: javax.validation.ValidationException: HV000183: Unable to 
initialize 'javax.el.ExpressionFactory'. Check that you have the EL 
dependencies on the classpath, or use ParameterMessageInterpolator instead
-      ~       at 
org.hibernate.validator.messageinterpolation.ResourceBundleMessageInterpolator.buildExpressionFactory(ResourceBundleMessageInterpolator.java:102)
-      ~       at 
org.hibernate.validator.messageinterpolation.ResourceBundleMessageInterpolator.<init>(ResourceBundleMessageInterpolator.java:45)
-      ~       at 
org.hibernate.validator.internal.engine.ConfigurationImpl.getDefaultMessageInterpolator(ConfigurationImpl.java:423)
-      ~       at 
org.hibernate.validator.internal.engine.ConfigurationImpl.getDefaultMessageInterpolatorConfiguredWithClassLoader(ConfigurationImpl.java:575)
-      ~       at 
org.hibernate.validator.internal.engine.ConfigurationImpl.getMessageInterpolator(ConfigurationImpl.java:364)
-      ~       at 
org.hibernate.validator.internal.engine.ValidatorFactoryImpl.<init>(ValidatorFactoryImpl.java:148)
-      ~       at 
org.hibernate.validator.HibernateValidator.buildValidatorFactory(HibernateValidator.java:38)
-      ~       at 
org.hibernate.validator.internal.engine.ConfigurationImpl.buildValidatorFactory(ConfigurationImpl.java:331)
-      ~       at 
javax.validation.Validation.buildDefaultValidatorFactory(Validation.java:110)
-      ~       at 
org.apache.druid.guice.ConfigModule.configure(ConfigModule.java:39)
-      ~       at 
com.google.inject.spi.Elements$RecordingBinder.install(Elements.java:340)
-      ~       at com.google.inject.spi.Elements.getElements(Elements.java:110)
-      ~       at 
com.google.inject.internal.InjectorShell$Builder.build(InjectorShell.java:138)
-      ~       at 
com.google.inject.internal.InternalInjectorCreator.build(InternalInjectorCreator.java:104)
-      ~       ... 14 more
-      ~   Caused by: java.lang.NoSuchMethodError: 
javax.el.ExpressionFactory.newInstance()Ljavax/el/ExpressionFactory;
-      ~       at 
org.hibernate.validator.messageinterpolation.ResourceBundleMessageInterpolator.buildExpressionFactory(ResourceBundleMessageInterpolator.java:98)
-      ~       ... 27 more
-      -->
-    <notes><![CDATA[
-   file name: hibernate-validator-5.3.6.Final.jar
-   file name: hibernate-validator-5.2.5.Final.jar
-   ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.hibernate/hibernate\-validator@.*$</packageUrl>
-    <cve>CVE-2017-7536</cve>
-    <cve>CVE-2019-10219</cve> <!-- We don't use SafeHtml validator annotation 
https://nvd.nist.gov/vuln/detail/CVE-2019-10219 -->
-    <cve>CVE-2019-14900</cve> <!-- Not applicable to hibernate validator 
https://github.com/hibernate/hibernate-orm/pull/3438 -->
-    <cve>CVE-2020-10693</cve> <!-- We don't take user input in constraint 
violation message https://hibernate.atlassian.net/browse/HV-1774 -->
-    <cve>CVE-2020-25638</cve>
-  </suppress>
-  <suppress>
-    <!-- TODO: Fix by updating curator-x-discovery to > 4.2.0 and updating 
hadoop -->
-    <notes><![CDATA[
-   file name: jackson-mapper-asl-1.9.13.jar
-   ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.codehaus\.jackson/jackson\-mapper\[email protected]$</packageUrl>
-    <cvssBelow>10</cvssBelow>  <!-- suppress all CVEs for 
jackson-mapper-asl:1.9.13 ince it is via curator-x-discovery -->
-  </suppress>
-  <suppress>
-    <!-- TODO: Fix by updating 
org.apache.druid.java.util.http.client.NettyHttpClient to use netty 4 -->
-    <notes><![CDATA[
-   file name: netty-3.10.6.Final.jar
-   ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/io\.netty/[email protected]$</packageUrl>
-    <cve>CVE-2019-16869</cve>
-    <cve>CVE-2019-20444</cve>
-    <cve>CVE-2019-20445</cve>
-    <cve>CVE-2020-11612</cve>
-    <cve>CVE-2021-21290</cve> <!-- We don't use HttpPostRequestDecoder or 
HttpPostMultiPartRequestDecoder which uses vulnerable AbstractDiskHttpData - 
https://github.com/advisories/GHSA-5mcr-gq6c-3hq2 -->
-    <cve>CVE-2021-21295</cve> <!-- We don't use HTTP2MultiplexCodec or 
Http2FrameCodec or Http2StreamFrameToHttpObjectCodec affected or convert HTTP/2 
to HTTP/1.1 requests - https://github.com/advisories/GHSA-wm47-8v5p-wjpj -->
-    <cve>CVE-2021-21409</cve> <!-- We don't use Http2HeaderFrame or convert 
HTTP/2 to HTTP/1.1 requests https://github.com/advisories/GHSA-f256-j965-7f32 
-->
-    <cve>CVE-2021-37136</cve>
-    <cve>CVE-2021-37137</cve>
-    <cve>CVE-2021-43797</cve> <!-- We don't decode user HTTP requests nor 
forward them to remote systems, we also don't support for java 6 or lower - 
https://github.com/advisories/GHSA-wx5j-54mm-rqqq -->
-    <cve>CVE-2022-24823</cve> <!-- We don't decode user HTTP requests nor 
forward them to remote systems, we also don't support for java 6 or lower - 
https://github.com/advisories/GHSA-269q-hmxg-m83q -->
-    <cve>CVE-2022-41881</cve>
-    <cve>CVE-2023-34462</cve>  <!-- Suppressed since netty requests in Druid 
are internal, and not user-facing -->
-  </suppress>
-  <suppress>
-    <!-- TODO: Fix by upgrading hadoop-auth version -->
-    <notes><![CDATA[
-   file name: nimbus-jose-jwt-4.41.1.jar
-   ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/com\.nimbusds/nimbus\-jose\[email protected]$</packageUrl>
-    <cve>CVE-2019-17195</cve>
-  </suppress>
-  <suppress>
-    <!-- This CVE is a false positive. The CVE is not for apacheds-i18n -->
-    <notes><![CDATA[
-   file name: apacheds-i18n-2.0.0-M15.jar
-   ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.apache\.directory\.server/apacheds\-i18n@.*$</packageUrl>
-    <cve>CVE-2020-7791</cve>
-  </suppress>
-  <suppress>
-      <!-- TODO: Fix by using com.datastax.oss:java-driver-core instead of 
com.netflix.astyanax:astyanax in extensions-contrib/cassandra-storage -->
-      <notes><![CDATA[
-   file name: libthrift-0.6.1.jar
-   ]]></notes>
-      <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/[email protected]$</packageUrl>
-      <cve>CVE-2016-5397</cve>
-      <cve>CVE-2018-1320</cve>
-      <cve>CVE-2019-0205</cve>
-  </suppress>
-  <suppress>
-    <!-- TODO: Fix by using com.datastax.oss:java-driver-core instead of 
com.netflix.astyanax:astyanax in extensions-contrib/cassandra-storage     -->
-    <notes><![CDATA[
-    file name: jettison-1.*.jar
-    ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.codehaus\.jettison/jettison@1.*$</packageUrl>
-    <cve>CVE-2022-40149</cve>
-    <cve>CVE-2022-40150</cve>
-    <cve>CVE-2022-45685</cve>
-    <cve>CVE-2022-45693</cve>
-    <cve>CVE-2023-1436</cve>
+  <!-- CVE-2022-4244 is affecting plexus-utils package,
+  plexus-interpolation is wrongly matched - 
https://github.com/jeremylong/DependencyCheck/issues/5973 -->
+  <suppress base="true">
+    <packageUrl 
regex="true">^pkg:maven/org\.codehaus\.plexus/plexus-interpolation@.*$</packageUrl>
+    <cve>CVE-2022-4244</cve>
+    <cve>CVE-2022-4245</cve>
   </suppress>
+
   <suppress>
-    <!-- We need to wait for 17.0.0 of 
https://github.com/kubernetes-client/java/releases -->
-    <!-- We need to update several other components to move to Snakeyaml 2.0 
to address CVE-2022-1471 -->
-    <!-- Snakeyaml 1.33 added to dependencyManagement in main pom file -->
+    <!-- This presumably applies to maven build system -->
     <notes><![CDATA[
-    file name: snakeyaml-1.33.jar
-    ]]></notes>
-    <cve>CVE-2022-1471</cve>
-    <!-- false positive -->
-    <cve>CVE-2023-2251</cve>
-    <cve>CVE-2022-3064</cve>
+     file name: maven-settings
+     ]]></notes>
+    <cve>CVE-2021-26291</cve>
   </suppress>
+
   <suppress>
+    <!-- LDAP authentication check bypass FP no exploitability analysis -->
     <notes><![CDATA[
-   file name: htrace-core4-4.0.1-incubating.jar (shaded: 
com.fasterxml.jackson.core:jackson-annotations:2.4.0)
-   ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/com\.fasterxml\.jackson\.core/jackson\[email protected]$</packageUrl>
-    <cvssBelow>10</cvssBelow>  <!-- suppress all CVEs for 
jackson-annotations:2.4.0 since it is via htrace-core4 -->
+     file name: derby-10.14.2.0.jar
+     ]]></notes>
+    <cve>CVE-2022-46337</cve>
   </suppress>
+
   <suppress>
+    <!-- False positive fixed in 9.4.52
+    https://nvd.nist.gov/vuln/detail/CVE-2023-36479 -->
     <notes><![CDATA[
-   file name: htrace-core4-4.0.1-incubating.jar (shaded: 
com.fasterxml.jackson.core:jackson-core:2.4.0)
-   ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/com\.fasterxml\.jackson\.core/jackson\[email protected]$</packageUrl>
-    <cvssBelow>10</cvssBelow>  <!-- suppress all CVEs for jackson-core:2.4.0 
since it is via htrace-core4 -->
+     file name: jetty-servlets-9.4.53.v20231009.jar
+     ]]></notes>
+    <cve>CVE-2023-36479</cve>
   </suppress>
+
   <suppress>
     <!--
-      ~ TODO: Fix by updating hadoop-common used by 
extensions-core/parquet-extensions. Possibly need to change
-      ~ HdfsStorageDruidModule.configure()->FileSystem.get(conf) as well.
+      the suppressions here aren't currently applicable, but can be resolved 
once we update the version
       -->
     <notes><![CDATA[
-   file name: htrace-core4-4.0.1-incubating.jar (shaded: 
com.fasterxml.jackson.core:jackson-databind:2.4.0)
+   file name: jackson-databind-2.10.5.1.jar
    ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/com\.fasterxml\.jackson\.core/jackson\[email protected]$</packageUrl>
-    <cve>CVE-2018-14721</cve>  <!-- cvss of 10.0 -->
-    <cvssBelow>10</cvssBelow>  <!-- suppress all CVEs for 
jackson-databind:2.4.0 since it is via htrace-core4 -->
+    <packageUrl 
regex="true">^pkg:maven/com\.fasterxml\.jackson\.core/jackson\-databind@.*$</packageUrl>
+    <!-- CVE-2022-42003 and CVE-2022-42004 are related to 
UNWRAP_SINGLE_VALUE_ARRAYS which we do not use
+    https://nvd.nist.gov/vuln/detail/CVE-2022-42003
+    https://nvd.nist.gov/vuln/detail/CVE-2022-42004
+     -->
+    <cve>CVE-2022-42003</cve>
+    <cve>CVE-2022-42004</cve>
   </suppress>
+
   <suppress>
-    <!--
-      ~ TODO: Fix by updating parquet version in 
extensions-core/parquet-extensions.
-      -->
+    <!-- Avatica server itself is not affected. Vulnerability exists only on 
client. -->
     <notes><![CDATA[
-   file name: parquet-jackson-1.11.0.jar (shaded: 
com.fasterxml.jackson.core:jackson-{core,databind}:2.9.10)
+   file name: avatica-server-1.23.0.jar
    ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/com\.fasterxml\.jackson\.core/jackson\-.*@2.9.10$</packageUrl>
-    <cvssBelow>10</cvssBelow>  <!-- suppress all CVEs for 
jackson-{core,databind}:2.9.0 since it is via parquet transitive dependencies 
-->
+    <cve>CVE-2022-36364</cve>
+    <cve>CVE-2022-39135</cve>
+    <cve>CVE-2020-13955</cve>
   </suppress>
-  <suppress>
-     <notes><![CDATA[
-     file name: node-sass:4.13.1
 
-     The vulnerability is fixed in 4.13.1: 
https://github.com/sass/node-sass/issues/2816#issuecomment-575136455
-
-     But the dependency check plugin thinks it's still broken as the 
affected/fixed versions has not been updated on
-     Sonatype OSS Index: 
https://ossindex.sonatype.org/vuln/c97f4ae7-be1f-4f71-b238-7c095b126e74
-     ]]></notes>
-     <packageUrl regex="true">^pkg:npm/node\-sass@.*$</packageUrl>
-     <vulnerabilityName>CWE-400: Uncontrolled Resource Consumption ('Resource 
Exhaustion')</vulnerabilityName>
-  </suppress>
-  <suppress>
-    <!--
-      ~ TODO: Fix when Apache Ranger 2.1 is released
-      -->
-    <notes><![CDATA[
-    file name: kafka_2.11-2.0.0.jar
-    ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.apache\.kafka/[email protected]$</packageUrl>
-    <cve>CVE-2019-12399</cve>
-    <cve>CVE-2018-17196</cve>
-  </suppress>
+  <!-- DoS when using expression evaluator.guess -->
   <suppress>
-    <!--
-      ~ TODO: Fix when Apache Ranger 2.1 is released
-      - transitive dep from apache-ranger, upgrading to 2.1.0 adds other CVEs, 
staying at ranger 2.0.0 for now
-      -->
     <notes><![CDATA[
-    file name: kafka-clients-2.0.0.jar
+    file name: janino-3.1.9.jar
     ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.apache\.kafka/[email protected]$</packageUrl>
-    <cve>CVE-2019-12399</cve>
-    <cve>CVE-2018-17196</cve>
-    <cve>CVE-2023-25194</cve>
-  </suppress>
-  <suppress>
-    <notes><![CDATA[
-    file name: kafka-clients-3.2.0.jar
-    ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.apache\.kafka/kafka\-clients@.*$</packageUrl>
-    <cve>CVE-2022-34917</cve>
-  </suppress>
-  <suppress>
-    <!--
-      ~ ambari-metrics-emitter, druid-ranger-security
-      -->
-    <notes><![CDATA[
-    file name: log4j-1.2.17.jar
-    ]]></notes>
-    <packageUrl regex="true">^pkg:maven/log4j/[email protected]$</packageUrl>
-    <cve>CVE-2019-17571</cve>
-    <cve>CVE-2021-4104</cve>
-    <cve>CVE-2020-9493</cve>
-    <cve>CVE-2022-23307</cve>
-    <cve>CVE-2022-23305</cve>
-    <cve>CVE-2022-23302</cve>
-    <cve>CVE-2023-26464</cve>
-  </suppress>
-  <suppress>
-    <notes><![CDATA[
-    file name: log4j-core-2.17.1.jar
-    ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org.apache.logging.log4j/[email protected]$</packageUrl>
-    <cve>CVE-2022-33915</cve>
-  </suppress>
-  <suppress>
-     <notes><![CDATA[
-     file name: ambari-metrics-common-2.7.0.0.0.jar
-    ]]></notes>
-    <cve>CVE-2022-45855</cve>
-    <cve>CVE-2022-42009</cve>
-    <!-- Suppress hadoop CVEs that not applicable to hadoop-annotations -->
-    <cve>CVE-2022-25168</cve> <!-- Affected FileUtil.unTar(File, File) API 
isn't present in hadoop-annotations -->
-    <cve>CVE-2021-33036</cve> <!-- Only applicable to hadoop-yarn-server -->
-  </suppress>
-  <suppress>
-    <!--
-      - TODO: The lastest version of ambari-metrics-common is 2.7.0.0.0, 
released in July 2018.
-      -->
-    <notes><![CDATA[
-    file name: ambari-metrics-common-2.7.0.0.0.jar (shaded: 
io.netty:netty:3.10.5.Final)
-    ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/io\.netty/[email protected]$</packageUrl>
-    <cve>CVE-2019-16869</cve>
-    <cve>CVE-2019-20444</cve>
-    <cve>CVE-2019-20445</cve>
-    <cve>CVE-2021-37136</cve>
-    <cve>CVE-2021-37137</cve>
-    <cve>CVE-2021-4104</cve>
-    <cve>CVE-2020-9493</cve>
-    <cve>CVE-2022-23307</cve>
-    <cve>CVE-2022-23305</cve>
-    <cve>CVE-2022-23302</cve>
-    <cve>CVE-2022-41881</cve>
-    <cve>CVE-2020-11612</cve>
-  </suppress>
-  <suppress>
-       <!--
-         - TODO: The lastest version of ambari-metrics-common is 2.7.0.0.0, 
released in July 2018.
-         -->
-     <notes><![CDATA[
-     file name: ambari-metrics-common-2.7.0.0.0.jar (shaded: 
org.apache.hadoop:hadoop-annotations:2.6.0)
-     ]]></notes>
-     <packageUrl 
regex="true">^pkg:maven/org\.apache\.hadoop/hadoop\-annotations@.*$</packageUrl>
-     <cve>CVE-2015-1776</cve>
-     <cve>CVE-2016-3086</cve>
-     <cve>CVE-2016-5393</cve>
-     <cve>CVE-2016-6811</cve>
-     <cve>CVE-2017-3162</cve>
-     <cve>CVE-2018-11768</cve>
-     <cve>CVE-2018-1296</cve>
-     <cve>CVE-2018-8009</cve>
-     <cve>CVE-2018-8029</cve>
-  </suppress>
-  <suppress>
-    <notes><![CDATA[
-     file name: hadoop-*-3.3.1.jar
-     ]]></notes>
-    <cve>CVE-2018-11765</cve>
-    <cve>CVE-2020-9492</cve>
-    <cve>CVE-2021-31684</cve>
-    <cve>CVE-2021-35517</cve>
-    <cve>CVE-2021-35516</cve>
-    <cve>CVE-2021-35515</cve>
-    <cve>CVE-2021-36090</cve>
-    <cve>CVE-2022-2048</cve>
-    <cve>CVE-2022-3509</cve>
-    <cve>CVE-2022-40152</cve>
-  </suppress>
-  <suppress>
-    <!-- The CVE is not applicable to kafka-clients. -->
-    <notes><![CDATA[
-     file name: kafka-clients-2.8.0.jar
-     ]]></notes>
-    <cve>CVE-2021-26291</cve>
-  </suppress>
-  <suppress until="2021-12-30">
-    <!-- Suppress this until https://github.com/apache/druid/issues/11028 is 
resolved. -->
-    <notes><![CDATA[
-     This vulnerability should be fixed soon and the suppression should be 
removed.
-     ]]></notes>
-    <cve>CVE-2020-13949</cve>
+    <cve>CVE-2023-33546</cve>
   </suppress>
 
   <suppress>
-     <!-- (ranger, ambari, and aliyun-oss) these vulnerabilities are legit, 
but their latest releases still use the vulnerable jackson version -->
-     <notes><![CDATA[
-     file name: jackson-xc-1.9.x.jar or jackson-jaxrs-1.9.x.jar
-     ]]></notes>
-     <packageUrl 
regex="true">^pkg:maven/org\.codehaus\.jackson/jackson-(xc|jaxrs)@1.9.*$</packageUrl>
-     <cve>CVE-2018-14718</cve>
-     <cve>CVE-2018-7489</cve>
-     <cve>CVE-2022-42003</cve>
-     <cve>CVE-2022-42004</cve>
-  </suppress>
-  <suppress>
-    <!-- aliyun-oss -->
-    <notes><![CDATA[
-    file name: ini4j-0.5.4.jar
-    ]]></notes>
-    <packageUrl regex="true">^pkg:maven/org\.ini4j/ini4j@.*$</packageUrl>
-    <vulnerabilityName>CVE-2022-41404</vulnerabilityName>
-  </suppress>
-  <suppress>
-    <!-- Transitive dependency from apache-ranger, latest ranger version 2.1.0 
still uses solr 7.7.1-->
+    <!-- from extensions using hadoop-client-runtime, these dependencies are 
shaded in the jar -->
     <notes><![CDATA[
-     file name: solr-solrj-7.7.1.jar
+     file name: hadoop-client-runtime-3.3.6.jar
      ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.apache\.solr/[email protected]$</packageUrl>
-    <cve>CVE-2020-13957</cve>
-    <cve>CVE-2019-17558</cve>
-    <cve>CVE-2019-0193</cve>
-    <cve>CVE-2020-13941</cve>
-    <cve>CVE-2021-29943</cve>
-    <cve>CVE-2021-27905</cve>
-    <cve>CVE-2021-29262</cve>
-    <cve>CVE-2021-44548</cve>
+    <!-- this one is windows only - 
https://nvd.nist.gov/vuln/detail/CVE-2022-26612 -->
+    <cve>CVE-2022-26612</cve>
+    <!-- this one seems to apply to backend server - 
https://nvd.nist.gov/vuln/detail/CVE-2023-25613 -->
+    <cve>CVE-2023-25613</cve>
+    <cve>CVE-2023-2976</cve> <!-- hadoop-client-runtime isn't using 
com.google.common.io.FileBackedOutputStream -->
+    <!-- CVE from shaded dependency nimbus-jose-jwt, fixed in upcoming Hadoop 
release version -
+    
https://github.com/apache/hadoop/commit/ad49ddda0e1d9632c8c9fcdc78fca8244e1248c9
 -->
+    <cve>CVE-2023-1370</cve>
+    <cve>CVE-2023-37475</cve> <!-- Suppressing since CVE wrongly linked to 
apache:avro project - https://github.com/jeremylong/DependencyCheck/issues/5843 
-->
+    <cve>CVE-2023-39410</cve> <!-- This seems to be a legitimate 
vulnerability. But there is no fix as of yet in Hadoop repo -->
+    <cve>CVE-2023-44487</cve> <!-- Occurs in the version of Hadoop used by 
Jetty, but it hasn't been fixed by Hadoop yet-->
+    <cve>CVE-2023-36478</cve> <!-- Occurs in the version of Hadoop used by 
Jetty, but it hasn't been fixed by Hadoop yet-->
   </suppress>
 
+  <!-- those are false positives, no other tools report any of those CVEs in 
the hadoop package -->
   <suppress>
-    <!-- Transitive dependency from aliyun-sdk-oss, there is currently no 
newer version of jdom2 as well-->
-    <notes><![CDATA[
-     file name: jdom2-2.0.6.jar
-     ]]></notes>
-    <packageUrl regex="true">^pkg:maven/org\.jdom/[email protected]$</packageUrl>
-    <cve>CVE-2021-33813</cve>
-  </suppress>
+      <notes><![CDATA[
+      file name: hadoop-*-3.3.1.jar
+      ]]></notes>
+        <cve>CVE-2015-7430</cve>
+        <cve>CVE-2017-3162</cve>
+        <cve>CVE-2021-31684</cve>
+        <cve>CVE-2022-3509</cve>
+        <cve>CVE-2022-40152</cve>
+    </suppress>
 
-  <suppress>
-    <!-- Upgrading to libthrift-0.14.2 adds many tomcat CVEs, suppress and 
stay at 0.13.0 for now-->
-    <notes><![CDATA[
-     file name: libthrift-0.13.0.jar
-     ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/[email protected]$</packageUrl>
-    <cve>CVE-2020-13949</cve>
-  </suppress>
   <suppress>
     <!--
       1. hive-storage-api has the thrift vulnerability too
@@ -478,20 +160,12 @@
     <notes><![CDATA[
      file name: hive-storage-api-2.8.1.jar
      ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.apache\.hive/[email protected]$</packageUrl>
+    <packageUrl regex="true">^pkg:maven/org\.apache\.hive.*</packageUrl>
     <cve>CVE-2020-13949</cve>
     <cve>CVE-2021-34538</cve>
     <cve>CVE-2021-4125</cve>
   </suppress>
-  <suppress>
-    <!--
-    the scanner misattributes this to Apache DataSketches
-    the actual vulnerability affects some collaboration tool called Sketch, 
and impacts some 'library feeds' feature
-    which seems to relate to how the tool handles sharing designs or 
something, so we are doing a blanket ignore
-    because it seems nearly impossible for us to be affected by this
-     -->
-    <cve>CVE-2021-40531</cve>
-  </suppress>
+
   <suppress>
     <!-- These are for wildfly-openssl. -->
     <notes><![CDATA[
@@ -503,157 +177,165 @@
     <cve>CVE-2022-1278</cve>
   </suppress>
 
+
   <suppress>
-    <!-- Suppress aws-java-sdk-bundle cves -->
     <notes><![CDATA[
-    file name: aws-java-sdk-bundle-1.11.901.jar
+    file name: kafka-clients-3.2.0.jar
     ]]></notes>
-    <cve>CVE-2020-8570</cve>
-    <cve>CVE-2015-8559</cve>
-    <cve>CVE-2021-20291</cve>
-    <cve>CVE-2017-17485</cve>
-    <cve>CVE-2018-5968</cve>
-    <cve>CVE-2017-15095</cve>
-    <cve>CVE-2019-16942</cve>
-    <cve>CVE-2020-25649</cve>
-    <cve>CVE-2020-35491</cve>
-    <cve>CVE-2019-16943</cve>
-    <cve>CVE-2020-35490</cve>
-    <cve>CVE-2019-20330</cve>
-    <cve>CVE-2020-10673</cve>
-    <cve>CVE-2018-11307</cve>
-    <cve>CVE-2018-7489</cve>
-    <cve>CVE-2019-17267</cve>
-    <cve>CVE-2019-17531</cve>
-    <cve>CVE-2019-16335</cve>
-    <cve>CVE-2019-14893</cve>
-    <cve>CVE-2019-14540</cve>
-    <cve>CVE-2021-37136</cve>
-    <cve>CVE-2021-37137</cve>
+    <packageUrl 
regex="true">^pkg:maven/org\.apache\.kafka/kafka\-clients@.*$</packageUrl>
+    <cve>CVE-2022-34917</cve>
+    <cve>CVE-2023-25194</cve>
   </suppress>
 
   <suppress>
-    <!-- Suppress hadoop-shaded-guava cves -->
     <notes><![CDATA[
-    file name: hadoop-shaded-guava-1.1.1.jar
+    file name: woodstox-core-6.2.4.jar
     ]]></notes>
-    <cve>CVE-2015-7430</cve>
-    <cve>CVE-2017-3162</cve>
+    <cve>CVE-2023-34411</cve>
   </suppress>
 
   <suppress>
-    <!-- False alarm for the Async javascript library 
(https://github.com/caolan/async) which is a dev dependency for the web console 
-->
     <notes><![CDATA[
-   file name: async-http-client-netty-utils-2.5.3.jar
-   ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.asynchttpclient/[email protected]$</packageUrl>
-    <cve>CVE-2021-43138</cve>
+    file name: spatial4j-0.7.jar:
+    ]]></notes>
+    <cve>CVE-2014-125074</cve>
   </suppress>
 
   <suppress>
-    <!-- False alarm for the Async javascript library 
(https://github.com/caolan/async) which is a dev dependency for the web console 
-->
+    <!-- Pulled in by io.kubernetes:client-java and kafka_2.13 but not fixed 
in either place yet -->
+    <!-- jose4j before v0.9.3 allows attackers to set a low iteration count of 
1000 or less -->
     <notes><![CDATA[
-   file name: async-http-client-2.5.3.jar
-   ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.asynchttpclient/[email protected]$</packageUrl>
-    <cve>CVE-2021-43138</cve>
+    file name: jose4j-0.7.3.jar
+    ]]></notes>
+    <packageUrl 
regex="true">^pkg:maven/org\.bitbucket\.b_c/jose4j@.*$</packageUrl>
+    <cve>CVE-2023-31582</cve>
   </suppress>
 
-
   <suppress>
-    <!-- Jackson CVEs when processing objects of large depth. Consider 
updating -->
-
+    <!-- okhttp -->
     <notes><![CDATA[
-   file name: *jackson-*.jar
+   file name: okhttp-*.jar
    ]]></notes>
-    <cve>CVE-2022-45688</cve>
+    <cve>CVE-2021-0341</cve>  <!-- Suppressed since okhttp requests in Druid 
are internal, and not user-facing -->
+    <cve>CVE-2016-2402</cve>   <!-- Suppressed since okhttp requests in Druid 
are internal, and not user-facing -->
+    <cve>CVE-2023-0833</cve>  <!-- Suppressed since okhttp requests in Druid 
are internal, and not user-facing -->
   </suppress>
 
   <suppress>
-    <!-- Non-applicable CVE for gson -->
+    <!-- TODO: Fix by updating curator-x-discovery to > 4.2.0 and updating 
hadoop -->
     <notes><![CDATA[
-   file name: gson-*.jar
+   file name: jackson-mapper-asl-1.9.13.jar
    ]]></notes>
-    <cve>CVE-2022-25647</cve>
+    <packageUrl 
regex="true">^pkg:maven/org\.codehaus\.jackson/jackson\-mapper\[email protected]$</packageUrl>
+    <cvssBelow>10</cvssBelow>  <!-- suppress all CVEs for 
jackson-mapper-asl:1.9.13 ince it is via curator-x-discovery -->
   </suppress>
 
   <suppress>
-    <!-- Non-applicable CVE for jedis, since we don't use lua scripts -->
+    <!-- TODO: Fix by updating 
org.apache.druid.java.util.http.client.NettyHttpClient to use netty 4 -->
     <notes><![CDATA[
-   file name: jedis-2.9.0.jar
+   file name: netty-3.10.6.Final.jar
    ]]></notes>
-    <cve>CVE-2021-32626</cve>
-    <cve>CVE-2022-24735</cve>
+    <packageUrl 
regex="true">^pkg:maven/io\.netty/[email protected]$</packageUrl>
+    <cve>CVE-2019-16869</cve>
+    <cve>CVE-2019-20444</cve>
+    <cve>CVE-2019-20445</cve>
+    <cve>CVE-2020-11612</cve>
+    <cve>CVE-2021-21290</cve> <!-- We don't use HttpPostRequestDecoder or 
HttpPostMultiPartRequestDecoder which uses vulnerable AbstractDiskHttpData - 
https://github.com/advisories/GHSA-5mcr-gq6c-3hq2 -->
+    <cve>CVE-2021-21295</cve> <!-- We don't use HTTP2MultiplexCodec or 
Http2FrameCodec or Http2StreamFrameToHttpObjectCodec affected or convert HTTP/2 
to HTTP/1.1 requests - https://github.com/advisories/GHSA-wm47-8v5p-wjpj -->
+    <cve>CVE-2021-21409</cve> <!-- We don't use Http2HeaderFrame or convert 
HTTP/2 to HTTP/1.1 requests https://github.com/advisories/GHSA-f256-j965-7f32 
-->
+    <cve>CVE-2021-37136</cve>
+    <cve>CVE-2021-37137</cve>
+    <cve>CVE-2021-43797</cve> <!-- We don't decode user HTTP requests nor 
forward them to remote systems, we also don't support for java 6 or lower - 
https://github.com/advisories/GHSA-wx5j-54mm-rqqq -->
+    <cve>CVE-2022-24823</cve> <!-- We don't decode user HTTP requests nor 
forward them to remote systems, we also don't support for java 6 or lower - 
https://github.com/advisories/GHSA-269q-hmxg-m83q -->
+    <cve>CVE-2022-41881</cve>
+    <cve>CVE-2023-34462</cve>  <!-- Suppressed since netty requests in Druid 
are internal, and not user-facing -->
   </suppress>
 
   <suppress>
-    <!-- pac4j-core-3.8.3 -->
+    <!-- TODO: Fix by using com.datastax.oss:java-driver-core instead of 
com.netflix.astyanax:astyanax in extensions-contrib/cassandra-storage -->
     <notes><![CDATA[
-   file name: pac4j-core-3.8.3.jar
+   file name: libthrift-0.6.1.jar
    ]]></notes>
-    <cve>CVE-2021-44878</cve>
+      <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/[email protected]$</packageUrl>
+      <cve>CVE-2018-1320</cve>
+      <cve>CVE-2019-0205</cve>
   </suppress>
 
   <suppress>
-    <!-- cassandra-all-1.0.8.jar -->
+    <!-- TODO: Fix by using com.datastax.oss:java-driver-core instead of 
com.netflix.astyanax:astyanax in extensions-contrib/cassandra-storage     -->
     <notes><![CDATA[
-   file name: cassandra-all-1.0.8.jar
-   ]]></notes>
-    <cve>CVE-2020-17516</cve>
+    file name: jettison-1.*.jar
+    ]]></notes>
+    <packageUrl 
regex="true">^pkg:maven/org\.codehaus\.jettison/jettison@1.*$</packageUrl>
+    <cve>CVE-2022-40149</cve>
+    <cve>CVE-2022-40150</cve>
+    <cve>CVE-2022-45685</cve>
+    <cve>CVE-2022-45693</cve>
+    <cve>CVE-2023-1436</cve>
   </suppress>
 
   <suppress>
-    <!-- okhttp -->
+    <!-- We need to wait for 17.0.0 of 
https://github.com/kubernetes-client/java/releases -->
+    <!-- We need to update several other components to move to Snakeyaml 2.0 
to address CVE-2022-1471 -->
+    <!-- Snakeyaml 1.33 added to dependencyManagement in main pom file -->
     <notes><![CDATA[
-   file name: okhttp-*.jar
-   ]]></notes>
-    <cve>CVE-2021-0341</cve>
-    <cve>CVE-2016-2402</cve>   <!-- Suppressed since okhttp requests in Druid 
are internal, and not user-facing -->
+    file name: snakeyaml-1.33.jar
+    ]]></notes>
+    <cve>CVE-2022-1471</cve>
+    <!-- false positive -->
+    <cve>CVE-2023-2251</cve>
+    <cve>CVE-2022-3064</cve>
   </suppress>
 
   <suppress>
-    <!-- parquet-format-structures-1.12.0.jar -->
-    <notes><![CDATA[
-   file name: parquet-format-structures-1.12.0.jar
-   ]]></notes>
-    <cve>CVE-2021-41561</cve>
+     <notes><![CDATA[
+     file name: node-sass:4.13.1
+
+     The vulnerability is fixed in 4.13.1: 
https://github.com/sass/node-sass/issues/2816#issuecomment-575136455
+
+     But the dependency check plugin thinks it's still broken as the 
affected/fixed versions has not been updated on
+     Sonatype OSS Index: 
https://ossindex.sonatype.org/vuln/c97f4ae7-be1f-4f71-b238-7c095b126e74
+     ]]></notes>
+     <packageUrl regex="true">^pkg:npm/node\-sass@.*$</packageUrl>
+     <vulnerabilityName>CWE-400: Uncontrolled Resource Consumption ('Resource 
Exhaustion')</vulnerabilityName>
   </suppress>
 
   <suppress>
-    <!-- Avatica server itself is not affected. Vulnerability exists only on 
client. -->
-    <notes><![CDATA[
-   file name: avatica-server-1.17.0.jar
-   ]]></notes>
-    <cve>CVE-2022-36364</cve>
-    <cve>CVE-2022-39135</cve>
+     <!-- (ranger, ambari, and aliyun-oss) these vulnerabilities are legit, 
but their latest releases still use the vulnerable jackson version -->
+     <notes><![CDATA[
+     file name: jackson-xc-1.9.x.jar or jackson-jaxrs-1.9.x.jar
+     ]]></notes>
+     <packageUrl 
regex="true">^pkg:maven/org\.codehaus\.jackson/jackson-(xc|jaxrs)@1.9.*$</packageUrl>
+     <cve>CVE-2018-14718</cve>
+     <cve>CVE-2018-7489</cve>
+     <cve>CVE-2022-42003</cve>
+     <cve>CVE-2022-42004</cve>
   </suppress>
+
   <suppress>
+    <!-- Upgrading to libthrift-0.14.2 adds many tomcat CVEs, suppress and 
stay at 0.13.0 for now-->
+    <!-- valid issue, worth investigating overhauling to e.g.,         0.19.0 
-->
     <notes><![CDATA[
-    file name: calcite-core-1.21.0.jar
-    ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.apache\.calcite/calcite\-core@.*$</packageUrl>
-    <cve>CVE-2020-13955</cve>
+     file name: libthrift-0.13.0.jar
+     ]]></notes>
+    <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/libthrift@.*</packageUrl>
+    <cve>CVE-2020-13949</cve>
   </suppress>
+
   <suppress>
-    <!-- avatica-server-1.17.0.jar -->
+    <!-- Non-applicable CVE for gson -->
     <notes><![CDATA[
-   file name: avatica-server-1.17.0.jar
+   file name: gson-*.jar
    ]]></notes>
-    <!--
-    We do not expose any of the SQL operators that were found vulnerable in 
this CVE.
-    -->
-    <cve>CVE-2022-39135</cve>
+    <cve>CVE-2022-25647</cve>
   </suppress>
 
   <suppress>
-    <!-- calcite-core-1.21.0.jar -->
+    <!-- pac4j-core-3.8.3 -->
     <notes><![CDATA[
-   file name: calcite-core-1.21.0.jar
+   file name: pac4j-core-3.8.3.jar
    ]]></notes>
-    <!--
-    We do not expose any of the SQL operators that were found vulnerable in 
this CVE.
-    -->
-    <cve>CVE-2022-39135</cve>
+    <cve>CVE-2021-44878</cve>
   </suppress>
 
   <suppress>
@@ -676,6 +358,7 @@
      <packageUrl regex="true">^pkg:npm/d3\-color@.*$</packageUrl>
      <vulnerabilityName>1084597</vulnerabilityName>
    </suppress>
+
    <suppress>
      <notes><![CDATA[
      file name: protobuf-java-3.11.0.jar
@@ -683,6 +366,7 @@
      <packageUrl 
regex="true">^pkg:maven/com\.google\.protobuf/protobuf\-java@.*$</packageUrl>
      <cve>CVE-2022-3171</cve>
    </suppress>
+
    <suppress>
      <notes><![CDATA[
      file name: protobuf-java-util-3.11.0.jar
@@ -690,6 +374,7 @@
      <packageUrl 
regex="true">^pkg:maven/com\.google\.protobuf/protobuf\-java\-util@.*$</packageUrl>
      <cve>CVE-2022-3171</cve>
    </suppress>
+
    <suppress>
      <notes><![CDATA[
      file name: ansi-regex:5.0.0
@@ -698,6 +383,7 @@
      <vulnerabilityName>1084697</vulnerabilityName>
      <cve>CVE-2021-3807</cve>
    </suppress>
+
    <suppress>
      <notes><![CDATA[
      file name: glob-parent:5.1.1
@@ -706,6 +392,7 @@
      <vulnerabilityName>1081884</vulnerabilityName>
      <cve>CVE-2020-28469</cve>
    </suppress>
+
    <suppress>
      <notes><![CDATA[
      file name: minimatch:3.0.4
@@ -713,22 +400,7 @@
      <packageUrl regex="true">^pkg:npm/minimatch@.*$</packageUrl>
      <vulnerabilityName>1084765</vulnerabilityName>
    </suppress>
-   <suppress>
-     <notes><![CDATA[
-     file name: y18n:4.0.0
-     ]]></notes>
-     <packageUrl regex="true">^pkg:npm/y18n@.*$</packageUrl>
-     <vulnerabilityName>1070209</vulnerabilityName>
-     <cve>CVE-2020-7774</cve>
-   </suppress>
-  <suppress>
-    <!-- druid-ranger-security -->
-    <notes><![CDATA[
-     file name: ranger-plugins-common-2.0.0.jar
-     ]]></notes>
-    <!-- seems not applicable to plugin -->
-    <cve>CVE-2022-45048</cve>
-  </suppress>
+
   <suppress>
     <!-- from extensions using hadoop-client-runtime, these dependencies are 
shaded in the jar -->
     <notes><![CDATA[
@@ -747,6 +419,7 @@
     <cve>CVE-2023-44487</cve> <!-- Occurs in the version of Hadoop used by 
Jetty, but it hasn't been fixed by Hadoop yet-->
     <cve>CVE-2023-36478</cve> <!-- Occurs in the version of Hadoop used by 
Jetty, but it hasn't been fixed by Hadoop yet-->
   </suppress>
+
   <suppress>
     <!-- from extensions using hadoop-client-api, these dependencies are 
shaded in the jar -->
     <notes><![CDATA[
@@ -755,14 +428,7 @@
     <vulnerabilityName>prototype pollution</vulnerabilityName>
     <cve>CVE-2020-28458</cve>
   </suppress>
-  <suppress>
-    <notes><![CDATA[
-     file name: ranger-plugins-*-2.0.0.jar
-     ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/org\.apache\.ranger/ranger\-plugins\-.*@2.0.0$</packageUrl>
-    <!-- applies to ranger-hive-plugin which afaict we do not use 
https://nvd.nist.gov/vuln/detail/CVE-2021-40331 -->
-    <cve>CVE-2021-40331</cve>
-  </suppress>
+
 
   <!-- filed against random script set, doesn't apply to any Maven artifacts - 
https://github.com/jeremylong/DependencyCheck/issues/5213 -->
   <suppress>
@@ -776,21 +442,12 @@
 
   <suppress>
     <notes><![CDATA[
-      file name: okio-1.17.2.jar, okio-1.15.0.jar
+      file name: okio-1.17.2.jar, okio-1.15.0.jar okio 2.8.0
     ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/com\.squareup\.okio/okio@1..*$</packageUrl>
+    <packageUrl 
regex="true">^pkg:maven/com\.squareup\.okio/okio@..*$</packageUrl>
     <cve>CVE-2023-3635</cve>  <!-- Suppressed since okio requests in Druid are 
internal, and not user-facing -->
   </suppress>
 
-  <suppress>
-    <notes><![CDATA[
-      file name: grpc-context-1.27.2.jar
-    ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/io\.grpc/[email protected]$</packageUrl>
-    <cve>CVE-2023-4785</cve> <!-- Not applicable to gRPC Java - 
https://nvd.nist.gov/vuln/detail/CVE-2023-4785 -->
-    <cve>CVE-2023-33953</cve> <!-- Not applicable to gRPC Java - 
https://cloud.google.com/support/bulletins#gcp-2023-022 -->
-  </suppress>
-
   <!-- CVE-2022-4244 is affecting plexus-utils package, plexus-interpolation 
is wrongly matched - https://github.com/jeremylong/DependencyCheck/issues/5973 
-->
   <suppress base="true">
     <packageUrl 
regex="true">^pkg:maven/org\.codehaus\.plexus/plexus-interpolation@.*$</packageUrl>
@@ -825,4 +482,163 @@
     ]]></notes>
     <cve>CVE-2023-4586</cve>
   </suppress>
+
+  <!-- druid cassandra storage exclusions -->
+  <suppress>
+      <!-- TODO: Fix by using com.datastax.oss:java-driver-core instead of 
com.netflix.astyanax:astyanax in extensions-contrib/cassandra-storage -->
+      <notes><![CDATA[
+   file name: libthrift-0.6.1.jar
+   ]]></notes>
+      <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/libthrift@.*$</packageUrl>
+      <cve>CVE-2016-5397</cve>
+      <cve>CVE-2018-1320</cve>
+      <cve>CVE-2019-0205</cve>
+      <cve>CVE-2015-3254</cve>
+  </suppress>
+  <!-- mostly false positives, need to use dependencies from current decade  
-->
+  <suppress>
+      <notes><![CDATA[
+   file name: avro-1.4.0-cassandra-1.jar  cassandra-all-1.0.8.jar
+   ]]></notes>
+      <cve>CVE-2012-6708</cve>
+      <cve>CVE-2015-9251</cve>
+      <cve>CVE-2019-11358</cve>
+      <cve>CVE-2020-11022</cve>
+      <cve>CVE-2020-11023</cve>
+      <cve>CVE-2020-7656</cve>
+      <cve>CVE-2011-4969</cve>
+      <cve>CVE-2020-17516</cve>
+      <cve>CVE-2020-13946</cve>
+  </suppress>
+  <!-- end of druid cassandra storage exclusions -->
+
+
+  <!-- druid-cloudfiles-extensions exclusions -->
+  <suppress>
+     <!-- CVEs added for completeness in pretty much dead extension  -->
+      <notes><![CDATA[
+   file name: openstack*-2.5.0.jar
+   ]]></notes>
+      <cve>CVE-2020-12689</cve>
+      <cve>CVE-2020-12691</cve>
+      <cve>CVE-2020-12690</cve>
+      <cve>CVE-2021-3563</cve>
+      <cve>CVE-2016-0738</cve>
+      <cve>CVE-2017-16613</cve>
+  </suppress>
+  <!-- end of druid-cloudfiles-extensions exclusions -->
+
+  <!-- graphite-emitter exclusions -->
+  <suppress>
+     <!-- CVEs added for completeness  -->
+      <notes><![CDATA[
+   file name: amqp-client-5.17.0.jar
+   ]]></notes>
+      <cve>CVE-2023-46120</cve>
+  </suppress>
+  <!-- end of graphite-emitter exclusions -->
+
+  <!-- ambari-metics-emitter exclusions -->
+  <suppress>
+       <!--
+         - TODO: The lastest version of ambari-metrics-common is 2.7.0.0.0, 
released in July 2018.
+         -->
+     <notes><![CDATA[
+     file name: ambari-metrics-common-2.7.0.0.0.jar (shaded: 
org.apache.hadoop:hadoop-annotations:2.6.0)
+     ]]></notes>
+     <packageUrl 
regex="true">^pkg:maven/org\.apache\.hadoop/hadoop\-annotations@.*$</packageUrl>
+     <cve>CVE-2015-1776</cve>
+     <cve>CVE-2016-3086</cve>
+     <cve>CVE-2016-5393</cve>
+     <cve>CVE-2016-6811</cve>
+     <cve>CVE-2017-3162</cve>
+     <cve>CVE-2018-11768</cve>
+     <cve>CVE-2018-1296</cve>
+     <cve>CVE-2018-8009</cve>
+     <cve>CVE-2018-8029</cve>
+  </suppress>
+
+  <suppress>
+    <notes><![CDATA[
+    file name: log4j-1.2.17.jar
+    ]]></notes>
+    <packageUrl regex="true">^pkg:maven/log4j/[email protected]$</packageUrl>
+    <cve>CVE-2019-17571</cve>
+    <cve>CVE-2021-4104</cve>
+    <cve>CVE-2020-9493</cve>
+    <cve>CVE-2022-23307</cve>
+    <cve>CVE-2022-23305</cve>
+    <cve>CVE-2022-23302</cve>
+    <cve>CVE-2023-26464</cve>
+  </suppress>
+
+  <suppress>
+    <!--
+      - TODO: The lastest version of ambari-metrics-common is 2.7.0.0.0, 
released in July 2018.
+      -->
+    <notes><![CDATA[
+    file name: ambari-metrics-common-2.7.0.0.0.jar (shaded: 
io.netty:netty:3.10.5.Final)
+    ]]></notes>
+    <packageUrl 
regex="true">^pkg:maven/io\.netty/[email protected]$</packageUrl>
+    <cve>CVE-2019-16869</cve>
+    <cve>CVE-2019-20444</cve>
+    <cve>CVE-2019-20445</cve>
+    <cve>CVE-2021-37136</cve>
+    <cve>CVE-2021-37137</cve>
+    <cve>CVE-2021-4104</cve>
+    <cve>CVE-2020-9493</cve>
+    <cve>CVE-2022-23307</cve>
+    <cve>CVE-2022-23305</cve>
+    <cve>CVE-2022-23302</cve>
+    <cve>CVE-2022-41881</cve>
+    <cve>CVE-2020-11612</cve>
+  </suppress>
+
+  <suppress>
+     <notes><![CDATA[
+     file name: ambari-metrics-common-2.7.0.0.0.jar
+    ]]></notes>
+    <cve>CVE-2022-45855</cve>
+    <cve>CVE-2022-42009</cve>
+    <!-- Suppress hadoop CVEs that not applicable to hadoop-annotations -->
+    <cve>CVE-2022-25168</cve> <!-- Affected FileUtil.unTar(File, File) API 
isn't present in hadoop-annotations -->
+    <cve>CVE-2021-33036</cve> <!-- Only applicable to hadoop-yarn-server -->
+     <cve>CVE-2020-9492</cve> <!-- Applicable to webHDFS client -->
+  </suppress>
+  <!-- end of ambari-metics-emitter exclusions -->
+
+  <!-- aliyun-oss exclusions -->
+  <suppress>
+   <!-- Transitive dependency from aliyun-sdk-oss, -->
+    <notes><![CDATA[
+    file name: ini4j-0.5.4.jar
+    ]]></notes>
+    <packageUrl regex="true">^pkg:maven/org\.ini4j/ini4j@.*$</packageUrl>
+    <vulnerabilityName>CVE-2022-41404</vulnerabilityName>
+  </suppress>
+
+  <suppress>
+    <!-- Transitive dependency from aliyun-sdk-oss, there is currently no 
newer version of jdom2 as well-->
+    <notes><![CDATA[
+     file name: jdom2-2.0.6.jar
+     ]]></notes>
+    <packageUrl regex="true">^pkg:maven/org\.jdom/[email protected]$</packageUrl>
+    <cve>CVE-2021-33813</cve>
+  </suppress>
+  <!-- end of aliyun-oss exclusions -->
+
+  <!-- iceberg exclusions -->
+  <suppress>
+    <!-- Transitive dependency from aliyun-sdk-oss, there is currently no 
newer version of jdom2 as well-->
+    <notes><![CDATA[
+     file name: libfb303-0.9.3.jar libthrift-0.9.3.jar
+     ]]></notes>
+      <cve>CVE-2016-5397</cve>
+      <cve>CVE-2018-1320</cve>
+      <cve>CVE-2019-0210</cve>
+      <cve>CVE-2020-13949</cve>
+      <cve>CVE-2019-0205</cve>
+      <cve>CVE-2019-0210</cve>
+      <cve>CVE-2020-13949</cve>
+  </suppress>
 </suppressions>


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]


Reply via email to