Path-Check / gaen-mobile

The mobile application supporting the GAEN Exposure Notifications protocol.
MIT License
42 stars 36 forks source link

CVE-2012-2677 (Medium) detected in boost-for-react-native-1.63.0 - autoclosed #951

Closed mend-bolt-for-github[bot] closed 1 year ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2012-2677 - Medium Severity Vulnerability

Vulnerable Library - boost-for-react-native-1.63.0

Library home page: https://github.com/react-native-community/boost-for-react-native/archive/v1.63.0-0.zip

Path to dependency file: /ios/Podfile.lock

Path to vulnerable library: /ios/Podfile.lock

Dependency Hierarchy: - RNCAsyncStorage-1.12.1 (Root Library) - React-Core-0.64.2 - React-jsi-0.64.2 - :x: **boost-for-react-native-1.63.0** (Vulnerable Library)

Found in HEAD commit: dfc6472b08bceae52f840d61037eead68f69fbcb

Found in base branch: develop

Vulnerability Details

Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected.

Publish Date: 2012-07-25

URL: CVE-2012-2677

CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2012-07-25

Fix Resolution: boost-1.80.0


Step up your Open Source Security Game with Mend here

mxMarkowitz commented 2 years ago

Tied to updating react native. Attempted using both auto update and manual update guides from fb. Both failed due to odd configuration issue. May be beneficial to take a clean react-native install and transfer code to it.

mend-bolt-for-github[bot] commented 1 year ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.