Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
References
| Link | Resource |
|---|---|
| https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca | Patch Third Party Advisory |
| https://hhvm.com/blog/2021/02/25/security-update.html | Release Notes Third Party Advisory |
| https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca | Patch Third Party Advisory |
| https://hhvm.com/blog/2021/02/25/security-update.html | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-03-10 16:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24025
Mitre link : CVE-2021-24025
CVE.ORG link : CVE-2021-24025
JSON object : View
Products Affected
- hhvm
