Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerabilities identified by https://ossindex.sonatype.org #681

Open
zhuoyu opened this issue May 24, 2022 · 3 comments · May be fixed by #753
Open

Vulnerabilities identified by https://ossindex.sonatype.org #681

zhuoyu opened this issue May 24, 2022 · 3 comments · May be fixed by #753
Labels

Comments

@zhuoyu
Copy link

zhuoyu commented May 24, 2022

Because of security concerns, my employer asks me to run vulnerability assessment for each R package before using it. The current method we have for vulnerability assessment is using the R package oysterR. This package actually checks vulnerabilities in the OSS Index from https://ossindex.sonatype.org.

Here are the code I used to run the vulnerability assessment, and one vulnerability is identified for the package haven.

library(oysteR)
audit <- audit_installed_r_pkgs()
audit[audit$package=="haven", "vulnerabilities"][[1]]

In the returned data, the description of the vulnerability is:
"1 non-CVE vulnerability found. To see more details, please create a free account at https://https://ossindex.sonatype.org/ and request for this information using your registered account"

And from the website, I found this link:

https://ossindex.sonatype.org/vulnerability/sonatype-2021-1261?component-type=cran&component-name=haven

where I found the following description:


Description
[sonatype-2021-1261] CWE-122: Heap-based Buffer Overflow

r-haven - Heap-based Buffer Overflow

A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().


Since the package haven is a dependence of many other packages, it would be great if the vulnerability could be cleaned up. I know it may not be a big issue, but the security team relies on the vulnerability report to approve R packages.

Thank you.

@gorcha
Copy link
Member

gorcha commented May 30, 2022

Hi @zhuoyu, thanks for the report!

@evanmiller this looks like a buffer overflow in ReadStat picked up OSS Fuzz:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33991

@hedsnz
Copy link

hedsnz commented Nov 22, 2022

Open issue upstream: WizardMac/ReadStat#285

@gorcha
Copy link
Member

gorcha commented Nov 22, 2022

Thanks!

hedsnz added a commit to hedsnz/haven that referenced this issue May 6, 2024
Resolves tidyverse#681. From this upstream commit: WizardMac/ReadStat@c7baae7, which is currently in the dev branch of readstat.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants