Description
Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
References (2)
Core 2
Core References
Release Notes, Third Party Advisory x_refsource_misc
https://hhvm.com/blog/2021/02/25/security-update.html
Patch, Third Party Advisory x_refsource_misc
https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca
Scores
CVSS v3
9.8
EPSS
0.0047
EPSS Percentile
64.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-190
CWE-122
Status
published
Products (6)
facebook/hhvm
4.94.0
facebook/hhvm
4.95.0
facebook/hhvm
4.96.0
facebook/hhvm
4.97.0
facebook/hhvm
4.98.0
facebook/hhvm
< 4.56.3
Published
Mar 10, 2021
Tracked Since
Feb 18, 2026