UBUNTU-CVE-2021-24025

Source
https://ubuntu.com/security/CVE-2021-24025
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-24025.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2021-24025
Related
Published
2021-03-10T16:15:00Z
Modified
2025-01-13T10:22:30Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.

References

Affected packages

Ubuntu:Pro:16.04:LTS / hhvm

Package

Name
hhvm
Purl
pkg:deb/ubuntu/hhvm@3.11.1+dfsg-1ubuntu1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.11.0+dfsg-1
3.11.1+dfsg-1
3.11.1+dfsg-1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / hhvm

Package

Name
hhvm
Purl
pkg:deb/ubuntu/hhvm@3.21.0+dfsg-2ubuntu2?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.21.0+dfsg-2
3.21.0+dfsg-2build1
3.21.0+dfsg-2build2
3.21.0+dfsg-2build3
3.21.0+dfsg-2ubuntu2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}