Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

guava fail guava 31.1-re, false positive? #76

Closed
THausherr opened this issue May 26, 2022 · 15 comments
Closed

guava fail guava 31.1-re, false positive? #76

THausherr opened this issue May 26, 2022 · 15 comments

Comments

@THausherr
Copy link

We're using 3.2 and getting this fail:

[ERROR] Failed to execute goal org.sonatype.ossindex.maven:ossindex-maven-plugin:3.2.0:audit (audit-dependencies) on project tika-core: Detected 1 vulnerable components:
[ERROR] com.google.guava:guava:jar:31.1-jre:test; https://ossindex.sonatype.org/component/pkg:maven/com.google.guava/guava@31.1-jre?utm_source=ossindex-client&utm_medium=integration&utm_content=1.8.1
[ERROR] * 1 vulnerability found (6.2); null

There is no known CVE for guava 31.1-jre . The website above mentions a MEDIUM vulnerability and tries to nudge me on subscribing, and that "There are some breaking changes" with even more confusion.

@ken-duck
Copy link

Hi!

OSS Index knows of many vulnerabilities beyond what are available in the National Vulnerability Database. Indeed the "breaking changes" mentioned is the fact that we have moved from our original data set to a new one which contains even MORE vulnerabilities than previously mentioned, but had different IDs (and we dropped support for a few ecosystems).

We have a sizeable research team that scour GitHub (and other sources) looking for unpublished vulnerabilities and verifying them before adding them to the database, and are rather confident in our results, so it is likely the vulnerability being reported is real and true.

An account at OSS Index is free and does not come encumbered with any additional requirements, and indeed ups the rate limits and data access that you might otherwise run into.

@tballison
Copy link

Y, so I got an account, and there are like 4 or 5 dependencies that are flagged that are false positives. Like the C++ library is vulnerable, but not our java one, or the issue your database cites is for a far older version.

Now that you're rolling this out, builds are breaking across the world because of bad data. And, this is good for you (and those who rely on your free service) because people will complain, and your database will get better, but my goodness this is painful. Really painful.

So, I'm grateful for your resource, but wow that was not the best move.

@ken-duck
Copy link

ken-duck commented May 27, 2022 via email

@tballison
Copy link

Thank you for your feedback. Should I open separate issues or list them here? Thank you again.

@ken-duck
Copy link

Listing here is fine. Even better would be if you could email us at ossindex@sonatype.org, which will go directly to the research team, but if you post them here I can forward them along.

@tballison
Copy link

K. Email sent.

@THausherr this is the issue that sonatype references for guava 31.1-jre: google/guava#4011

@tballison
Copy link

Our project will have to weigh the cost-benefit of continuing to use ossindex if we continue to get failed builds because of issues that affect up-to-date dependencies that we cannot upgrade our way out of.

Again, this is a free service, and I'm enormously grateful, but the churn over this update in your backend db is frustrating.

@ken-duck
Copy link

@tballison Thanks for the details!

I understand the pain that the update is surely causing. The main thrust of the update was moving OSS Index on to a new vulnerability database which has more vulnerabilities, is updated more frequently, has much fewer false positives and negatives, and has a far larger research team behind it. As you might expect it required a significant amount of effort and time as the entire backend has been changed out. It is unfortunate that it is and will cause pain during the transition, but in the end I think you will find it is well worth the effort.

There should not be any similar upgrades in the future, as it is very unlikely we will be moving to a new database and research team at any other point.

Our research team will look through the components/vulnerabilities you are concerned with and hopefully be able to provide you the information and assurance you need.

@tballison
Copy link

Got it. Thank you so much.

Two other items:

  1. Do we really have to create an account to see what the underlying problem is? It feels like a needless gathering of privacy information for when our build breaks. I've given up on this and have registered my info, but other folks on our team might not be willing to take the same approach. And it will be frustrating to them that our build is broken and they can't figure out why.
  2. If we can't upgrade our way out of a build failure, is there a general setting to ignore those cases where your db has identified a vuln in the most recent release of the dependency, but there's no fix available? The maintenance of our exclude lists is rather unpleasant, and I agree that you won't likely be migrating again, but the underlying database will be changing as new vulns are detected and possibly not remediated.

Thank you, again.

@OSSIndex-Admin
Copy link

OSSIndex-Admin commented May 27, 2022 via email

@ken-duck
Copy link

Whoops. @tballison , It occurs to me I made an assumption (based off of other feedback I am working with). I will look into making a PR for ossindex-maven as well which will allow you more control over the data.

@tballison
Copy link

And naturally, after signing up for an account so that I can figure out why our build is now failing, I get spam from ossindex about all the great features! I've now unsubscribed but this is just not right.

@ken-duck
Copy link

I have talked with the researchers, and not only does version 31.1-jre have a security vulnerability, but all versions of guava are vulnerable. The supporting information provided on the "references" on OSS Index verifies the finding.

@tballison
Copy link

Ok. So as a maintainer of an open source project that has a dependency with no available fix, my only option is to exclude that dependency from ossindex's checks?

@ken-duck
Copy link

Best bet would be to exclude that specific vulnerability, and not the dependency itself. Other than that I don't know of any other feasible solution.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants