CVE-2023-30470

A use-after-free related to unsound inference in the bytecode generation when optimizations are enabled for Hermes prior to commit da8990f737ebb9d9810633502f65ed462b819c09 could have been used by an attacker to achieve remote code execution. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Configurations

Configuration 1 (hide)

cpe:2.3:a:facebook:hermes:-:*:*:*:*:*:*:*

History

26 May 2023, 18:24

Type Values Removed Values Added
CPE cpe:2.3:a:facebook:hermes:-:*:*:*:*:*:*:*
First Time Facebook
Facebook hermes
References (MISC) https://github.com/facebook/hermes/commit/da8990f737ebb9d9810633502f65ed462b819c09 - (MISC) https://github.com/facebook/hermes/commit/da8990f737ebb9d9810633502f65ed462b819c09 - Patch
References (MISC) https://www.facebook.com/security/advisories/cve-2023-30470 - (MISC) https://www.facebook.com/security/advisories/cve-2023-30470 - Patch, Vendor Advisory
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

Information

Published : 2023-05-18 22:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-30470

Mitre link : CVE-2023-30470

CVE.ORG link : CVE-2023-30470


JSON object : View

Products Affected

facebook

  • hermes
CWE
CWE-416

Use After Free