First published: Wed Mar 10 2021(Updated: )
In the crypt function, we attempt to null terminate a buffer using the size of the input salt without validating that the offset is within the buffer. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
Credit: cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Facebook HHVM | <4.56.3 | |
Facebook HHVM | >=4.57.0<4.80.2 | |
Facebook HHVM | >=4.81.0<4.93.2 | |
Facebook HHVM | =4.94.0 | |
Facebook HHVM | =4.95.0 | |
Facebook HHVM | =4.96.0 | |
Facebook HHVM | =4.97.0 | |
Facebook HHVM | =4.98.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1921 is a vulnerability in the crypt function of HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0.
CVE-2020-1921 affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0. It does not affect versions 4.95.0, 4.96.0, 4.97.0, and 4.98.0.
CVE-2020-1921 has a severity rating of 7.5 (high).
To fix CVE-2020-1921, update your HHVM to version 4.56.3 or later, 4.80.2 or later, 4.93.2 or later, or 4.94.0 if you are using that specific version.
You can find more information about CVE-2020-1921 on the GitHub commit page (https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca) and the HHVM blog post (https://hhvm.com/blog/2021/02/25/security-update.html).