Does Dremio have a list of know false positive security findings in its dependencies?

We’re evaluating Dremio, and as part of that process we’ve preformed a dependency scan and found a number of issues. I’m sure lots of the CVEs are not applicable due to the way Dremio consumes the dependency, but so far haven’t found anything in these forms. Some apache projects like Solr have a public list to acknowledge these. Just looking to try and reduce duplicated effort and coming back here with a list of issues that are likely NA.

Hello @bradpark,

We do our own internal scans and have a suppression list of CVE’s that we consider “false positives” and can be safely ignored. We are working on making this publicly accessible, but it’s not there yet.

Do you have a particular set of CVE that are concerning you?

Thanks @ben, so it’s a bit of a long list and I’ve tried to format it the best that I can after filtering out obvious false-positives. I’ve also attached a spreadsheet listing every CVE, package, and how it is introduced into Dremio (12.3 KB). The spreadsheet looks worse than it is, 133 of 178 are related to two instances of Jackson Databind.

Let me know if there is anything else I can provide.

Dremio consumes Apache Avatica 1.12

Avictia consumers Jackson Databind 2.9.6 which currently has some 45 CVEs associated with it. 
While Avictia has since upgrade to Jackson 2.10.0 as of 1.16

Avictia also consumes protobuf-java 3.3.0 which is susceptible  to CVE-2015-5237. As of Avatica 1.13 they have upgraded to protobuf 3.5.1 which mitigates the CVE.

Dremio consumes dremio-ce-hive2-plugin, which seems to be the dremio fork of hive. Hive includes the following dependencies that were identified as containing known vulnerabilities

Hive itself shades several Apache HBase 1.1.13 jars that lack the fix for CVE-2018-8025

Hive also consumes jetty:6.1.26 which was release in 2010. Since then the project as moved from being managed by Mortbay to a standalone Jetty group. The name changes make it hard to follow from a CPE perspective, you can see the older mortbay CPE here:
Sonatype has a nice display that cuts across the different maintainers

Hive also has jQuery 1.8.2 which contains several known issues,*:*:*:*:*:*:*

Netty 4.1.34 has the following known issues

Jackson Databind 2.1.1 which has numerous CVEs predominantly related to gadget serialization

Guava 14.0.1 vulnerable to CVE-2018-10237

Protobuf-java 2.5.0 is vulnerable to buffer overflow CVE-2015-5237

Finally the Dremio hive fork itself seems to be based on 2.1.1, meaning it may be susceptible to the following CVEs*:*:*:*:*:*:*

dremio-twill-shaded contains guava 13.0.1 vulnerable to CVE-2018-10237

htrace-core4 4.1.0-incubating contains jackson-databind 2.4.0 which has a long list of know vulnerabilities

Dremio itself also directly consumes the following packages with known issues:

Elasticsearch 5.5.3 vulnerable to three known issues

Jackson-maper-asl 1.9.13, this project has been turned into jackson-databind and is susceptible to the same list of isses, as well as one of it's own CVE-2019-10172

Netty 3.10.6 vulnerable to the following

postgresql 42.2.5 vulnerable to CVE-2020-13692

scala-compiler 2.10.1 which contains vulnerable versions of jQuery*:*:*:*:*:*:*

scala-reflect 2.10.1 vulnerable to CVE-2017-15288