{ "schema_version": "1.4.0", "id": "GHSA-cc9j-57m4-w285", "modified": "2022-05-24T17:44:13Z", "published": "2022-05-24T17:44:13Z", "aliases": [ "CVE-2021-24025" ], "details": "Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-24025" }, { "type": "WEB", "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" }, { "type": "WEB", "url": "https://hhvm.com/blog/2021/02/25/security-update.html" } ], "database_specific": { "cwe_ids": [ "CWE-190" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-03-10T16:15:00Z" } }