You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Because of security concerns, my employer asks me to run vulnerability assessment for each R package before using it. The current method we have for vulnerability assessment is using the R package oysterR. This package actually checks vulnerabilities in the OSS Index from https://ossindex.sonatype.org.
Here are the code I used to run the vulnerability assessment, and one vulnerability is identified for the package haven.
In the returned data, the description of the vulnerability is:
"1 non-CVE vulnerability found. To see more details, please create a free account at https://https://ossindex.sonatype.org/ and request for this information using your registered account"
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Since the package haven is a dependence of many other packages, it would be great if the vulnerability could be cleaned up. I know it may not be a big issue, but the security team relies on the vulnerability report to approve R packages.
Thank you.
The text was updated successfully, but these errors were encountered:
Because of security concerns, my employer asks me to run vulnerability assessment for each R package before using it. The current method we have for vulnerability assessment is using the R package oysterR. This package actually checks vulnerabilities in the OSS Index from https://ossindex.sonatype.org.
Here are the code I used to run the vulnerability assessment, and one vulnerability is identified for the package haven.
In the returned data, the description of the vulnerability is:
"1 non-CVE vulnerability found. To see more details, please create a free account at https://https://ossindex.sonatype.org/ and request for this information using your registered account"
And from the website, I found this link:
https://ossindex.sonatype.org/vulnerability/sonatype-2021-1261?component-type=cran&component-name=haven
where I found the following description:
Description
[sonatype-2021-1261] CWE-122: Heap-based Buffer Overflow
r-haven - Heap-based Buffer Overflow
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Since the package haven is a dependence of many other packages, it would be great if the vulnerability could be cleaned up. I know it may not be a big issue, but the security team relies on the vulnerability report to approve R packages.
Thank you.
The text was updated successfully, but these errors were encountered: