Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[SMRT] Bump the @openzeppelin dependencies to address security advisories #15693

Open
jaybuidl opened this issue Dec 13, 2024 · 0 comments
Open

Comments

@jaybuidl
Copy link

Description

The latest version @chainlink/[email protected] depends on vulnerable versions of the OpenZeppelin contracts which can be upgraded to the v4 to address the vulnerabilities.

NPM resolutions:

  "resolutions": {
    "@openzeppelin/contracts@npm:4.5.0": "npm:4.9.6",
    "@openzeppelin/contracts@npm:4.7.3": "npm:4.9.6",
    "@openzeppelin/contracts@npm:4.8.3": "npm:4.9.6",
    "@openzeppelin/contracts@npm:4.9.3": "npm:4.9.6",
    "@openzeppelin/contracts-upgradeable@npm:4.5.2": "npm:4.9.6",
    "@openzeppelin/contracts-upgradeable@npm:4.7.3": "npm:4.9.6",
    "@openzeppelin/contracts-upgradeable@npm:4.8.3": "npm:4.9.6",
    "@openzeppelin/contracts-upgradeable@npm:4.9.3": "npm:4.9.6"
  },

Steps to Reproduce

Deps.dev

image
source

Dependencies Review Report

NameVersionVulnerabilitySeverity
@openzeppelin/contracts4.5.0OpenZeppelin Contracts's ERC165Checker may revert instead of returning falsehigh
OpenZeppelin Contracts's SignatureChecker may revert on invalid EIP-1271 signershigh
OpenZeppelin Contracts's GovernorVotesQuorumFraction updates to quorum may affect past defeated proposalshigh
OpenZeppelin Contracts vulnerable to ECDSA signature malleabilityhigh
GovernorCompatibilityBravo may trim proposal calldatahigh
OpenZeppelin Contracts ERC165Checker unbounded gas consumptionmoderate
OpenZeppelin Contracts TransparentUpgradeableProxy clashing selector calls may not be delegatedmoderate
OpenZeppelin Contracts's governor proposal creation may be blocked by frontrunningmoderate
OpenZeppelin Contracts vulnerable to Improper Escaping of Outputmoderate
OpenZeppelin Contracts base64 encoding may read from potentially dirty memorylow
@openzeppelin/contracts4.7.3GovernorCompatibilityBravo may trim proposal calldatahigh
OpenZeppelin Contracts TransparentUpgradeableProxy clashing selector calls may not be delegatedmoderate
OpenZeppelin Contracts's governor proposal creation may be blocked by frontrunningmoderate
OpenZeppelin Contracts using MerkleProof multiproofs may allow proving arbitrary leaves for specific treesmoderate
OpenZeppelin Contracts vulnerable to Improper Escaping of Outputmoderate
OpenZeppelin Contracts base64 encoding may read from potentially dirty memorylow
@openzeppelin/contracts-upgradeable4.5.2OpenZeppelin Contracts's ERC165Checker may revert instead of returning falsehigh
OpenZeppelin Contracts's SignatureChecker may revert on invalid EIP-1271 signershigh
OpenZeppelin Contracts's GovernorVotesQuorumFraction updates to quorum may affect past defeated proposalshigh
OpenZeppelin Contracts vulnerable to ECDSA signature malleabilityhigh
GovernorCompatibilityBravo may trim proposal calldatahigh
OpenZeppelin Contracts ERC165Checker unbounded gas consumptionmoderate
OpenZeppelin Contracts TransparentUpgradeableProxy clashing selector calls may not be delegatedmoderate
OpenZeppelin Contracts's governor proposal creation may be blocked by frontrunningmoderate
OpenZeppelin Contracts vulnerable to Improper Escaping of Outputmoderate
OpenZeppelin Contracts base64 encoding may read from potentially dirty memorylow
@openzeppelin/contracts-upgradeable4.7.3GovernorCompatibilityBravo may trim proposal calldatahigh
OpenZeppelin Contracts TransparentUpgradeableProxy clashing selector calls may not be delegatedmoderate
OpenZeppelin Contracts's governor proposal creation may be blocked by frontrunningmoderate
OpenZeppelin Contracts using MerkleProof multiproofs may allow proving arbitrary leaves for specific treesmoderate
OpenZeppelin Contracts vulnerable to Improper Escaping of Outputmoderate
OpenZeppelin Contracts base64 encoding may read from potentially dirty memorylow
@openzeppelin/contracts4.8.3OpenZeppelin Contracts's governor proposal creation may be blocked by frontrunningmoderate
OpenZeppelin Contracts using MerkleProof multiproofs may allow proving arbitrary leaves for specific treesmoderate
OpenZeppelin Contracts vulnerable to Improper Escaping of Outputmoderate
OpenZeppelin Contracts base64 encoding may read from potentially dirty memorylow
@openzeppelin/contracts-upgradeable4.8.3OpenZeppelin Contracts's governor proposal creation may be blocked by frontrunningmoderate
OpenZeppelin Contracts using MerkleProof multiproofs may allow proving arbitrary leaves for specific treesmoderate
OpenZeppelin Contracts vulnerable to Improper Escaping of Outputmoderate
OpenZeppelin Contracts base64 encoding may read from potentially dirty memorylow
@openzeppelin/contracts4.9.3OpenZeppelin Contracts base64 encoding may read from potentially dirty memorylow
@openzeppelin/contracts-upgradeable4.9.3OpenZeppelin Contracts base64 encoding may read from potentially dirty memorylow
@jaybuidl jaybuidl changed the title [SMRT] Bump the @openzeppelin dependencies to several security advisories [SMRT] Bump the @openzeppelin dependencies to address security advisories Dec 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant