dependencyCheckSuppressions.xml 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122
  1. <?xml version="1.0" encoding="UTF-8"?>
  2. <suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
  3. <!-- You can add <suppress>...</suppress> entries in here. -->
  4. <!-- Ignore CVE-2020-8908: Used by exoplayer, but vulnerable code (createTempDir)
  5. is not used. -->
  6. <suppress>
  7. <notes><![CDATA[
  8. file name: guava-27.1-android.jar
  9. ]]></notes>
  10. <packageUrl regex="true">^pkg:maven/com\.google\.guava/guava@.*$</packageUrl>
  11. <cve>CVE-2020-8908</cve>
  12. </suppress>
  13. <!-- Ignore CVE-2021-29425: Vulnerable code (FileNameUtils.normalize) not used. -->
  14. <suppress>
  15. <notes><![CDATA[
  16. file name: commons-io-2.6.jar
  17. ]]></notes>
  18. <packageUrl regex="true">^pkg:maven/commons\-io/commons\-io@.*$</packageUrl>
  19. <cve>CVE-2021-29425</cve>
  20. </suppress>
  21. <!-- Ignore CVE-2018-20200: It requires hooking into the running application, CVE is disputed.
  22. https://github.com/square/okhttp/issues/4967 -->
  23. <suppress>
  24. <notes><![CDATA[
  25. file name: okhttp-3.12.0.jar
  26. ]]></notes>
  27. <packageUrl regex="true">^pkg:maven/com\.squareup\.okhttp3/okhttp@.*$</packageUrl>
  28. <cve>CVE-2018-20200</cve>
  29. </suppress>
  30. <!-- Ignore CVEs against netty <4.1.44, even though at the time of this writing, only 4.1.72+
  31. is being used. -->
  32. <suppress>
  33. <notes><![CDATA[
  34. file name: core-0.0.8-alpha08.jar
  35. ]]></notes>
  36. <packageUrl regex="true">^pkg:maven/com\.google\.testing\.platform/core@.*$</packageUrl>
  37. <cve>CVE-2019-20444</cve>
  38. </suppress>
  39. <!-- Ignore CVE-2023-2976 against guava. Seems to affect only Android ICS as well as
  40. potentially developers' machines (which isn't really a realistic threat scenario here). -->
  41. <suppress>
  42. <notes><![CDATA[
  43. file name: guava-31.1-jre.jar
  44. ]]></notes>
  45. <packageUrl regex="true">^pkg:maven/com\.google\.guava/guava@.*$</packageUrl>
  46. <cve>CVE-2023-2976</cve>
  47. </suppress>
  48. <!-- Ignore CVE-2023-32697. The issue here is that RCE is possible through an SQLite JDBC URL.
  49. Since databases are hardcoded in the Android app, and JDBC URLs (or parts used in the URL)
  50. are not user-supplied, this shouldn't affect us. -->
  51. <suppress>
  52. <notes><![CDATA[
  53. file name: sqlite-jdbc-3.36.0.jar
  54. ]]></notes>
  55. <packageUrl regex="true">^pkg:maven/org\.xerial/sqlite\-jdbc@.*$</packageUrl>
  56. <cve>CVE-2023-32697</cve>
  57. </suppress>
  58. <!-- Ignore wrong matches. -->
  59. <suppress>
  60. <packageUrl regex="true">^pkg:maven/org\.saltyrtc/saltyrtc\-task\-webrtc@.*$</packageUrl>
  61. <cpe>cpe:/a:webrtc_project:webrtc</cpe>
  62. </suppress>
  63. <suppress>
  64. <packageUrl regex="true">^pkg:maven/org\.saltyrtc/saltyrtc\-task\-webrtc@.*$</packageUrl>
  65. <cpe>cpe:/a:tasks:tasks</cpe>
  66. </suppress>
  67. <suppress>
  68. <packageUrl regex="true">^pkg:maven/com\.huawei\.hmf/tasks@.*$</packageUrl>
  69. <cpe>cpe:/a:tasks:tasks</cpe>
  70. </suppress>
  71. <suppress>
  72. <packageUrl regex="true">^pkg:maven/org\.jetbrains\.kotlin/kotlin\-stdlib@.*$</packageUrl>
  73. <cpe>cpe:/a:jetbrains:kotlin</cpe>
  74. </suppress>
  75. <suppress>
  76. <packageUrl regex="true">^pkg:maven/org\.jetbrains\.kotlin/kotlin\-stdlib\-common@.*$
  77. </packageUrl>
  78. <cpe>cpe:/a:jetbrains:kotlin</cpe>
  79. </suppress>
  80. <suppress>
  81. <packageUrl regex="true">^pkg:maven/com\.google\.devtools\.ksp/symbol\-processing\-api@.*$
  82. </packageUrl>
  83. <cpe>cpe:/a:processing:processing</cpe>
  84. </suppress>
  85. <suppress>
  86. <packageUrl regex="true">^pkg:maven/androidx\.room/room\-compiler\-processing@.*$
  87. </packageUrl>
  88. <cpe>cpe:/a:processing:processing</cpe>
  89. </suppress>
  90. <suppress>
  91. <notes><![CDATA[
  92. file name: core-0.0.8-alpha08.jar
  93. ]]></notes>
  94. <packageUrl regex="true">^pkg:maven/com\.google\.testing\.platform/core@.*$</packageUrl>
  95. <cpe>cpe:/a:netty:netty</cpe>
  96. </suppress>
  97. <!-- Ignore CVE-2014-9152. The cve relates to drupal which is irrelevant for an android app -->
  98. <suppress>
  99. <notes><![CDATA[
  100. file name: storage-1.4.2.aar
  101. ]]></notes>
  102. <packageUrl regex="true">^pkg:maven/androidx\.test\.services/storage@.*$</packageUrl>
  103. <cpe>cpe:/a:services_project:services</cpe>
  104. </suppress>
  105. <!-- Ignore CVE-2015-3362. The cve relates to drupal which is irrelevant for an android app -->
  106. <suppress>
  107. <notes><![CDATA[
  108. file name: camera-video-1.3.2.aar
  109. ]]></notes>
  110. <packageUrl regex="true">^pkg:maven/androidx\.camera/camera\-video@.*$</packageUrl>
  111. <cpe>cpe:/a:video_project:video</cpe>
  112. </suppress>
  113. </suppressions>