Author: Derick Rethans (derickr)
Date: 2024-04-24T13:44:25-05:00

Commit: 
https://github.com/php/web-php/commit/68279fb1e6a199cbf01cde47aad44562ff9af5f0
Raw diff: 
https://github.com/php/web-php/commit/68279fb1e6a199cbf01cde47aad44562ff9af5f0.diff

Added statement on glibc vulnerability

Changed paths:
  A  archive/entries/2024-04-24-1.xml
  M  archive/archive.xml


Diff:

diff --git a/archive/archive.xml b/archive/archive.xml
index d5769aeaf7..f722736290 100644
--- a/archive/archive.xml
+++ b/archive/archive.xml
@@ -9,6 +9,7 @@
     <uri>http://php.net/contact</uri>
     <email>php-webmaster@lists.php.net</email>
   </author>
+  <xi:include href="entries/2024-04-24-1.xml"/>
   <xi:include href="entries/2024-04-11-3.xml"/>
   <xi:include href="entries/2024-04-11-2.xml"/>
   <xi:include href="entries/2024-04-11-1.xml"/>
diff --git a/archive/entries/2024-04-24-1.xml b/archive/entries/2024-04-24-1.xml
new file mode 100644
index 0000000000..1bdbe9e429
--- /dev/null
+++ b/archive/entries/2024-04-24-1.xml
@@ -0,0 +1,52 @@
+<?xml version="1.0" encoding="utf-8"?>
+<entry xmlns="http://www.w3.org/2005/Atom";>
+  <title>Statement on glibc/iconv Vulnerability</title>
+  <id>https://www.php.net/archive/2024.php#2024-04-24-1</id>
+  <published>2024-04-24T18:40:29+00:00</published>
+  <updated>2024-04-24T18:40:29+00:00</updated>
+  <link href="https://www.php.net/index.php#2024-04-24-1"; rel="alternate" 
type="text/html"/>
+  <link href="https://www.php.net/archive/2024.php#2024-04-24-1"; rel="via" 
type="text/html"/>
+  <category term="frontpage" label="PHP.net frontpage news"/>
+  <content type="xhtml">
+    <div xmlns="http://www.w3.org/1999/xhtml";>
+        <p>Recently, a bug in <b>glibc</b> version 2.39 and older (<a
+        href="archive/entries/2024-04-24-1.xml">CVE-2024-2961</a>) was 
uncovered
+        where a buffer overflow in character set conversions *to* the
+        ISO-2022-CN-EXT character set.</p>
+     
+        <p>This specific buffer overflow in glibc is exploitable through PHP,
+        which uses the iconv functionality in glibc to do character set
+        conversions. Although the bug is exploitable in the context of the PHP
+        Engine, the bug is not in PHP. It is also not directly exploitable
+        remotely.</p>
+     
+        <p>There are numerous reports online with titles like "Mitigating the
+        iconv Vulnerability for PHP (CVE-2024-2961)" or "PHP Under Attack". 
These
+        titles are misleading as this is *not* a bug in PHP itself.</p>
+     
+        <p>Currently there is no fix for this issue, but there is a workaround
+        described in <a
+        
href="https://rockylinux.org/news/glibc-vulnerability-april-2024/";>GLIBC
+        Vulnerability on Servers Serving PHP</a>. It explains a way how to 
remove
+        the problematic character set from glibc. Perform this procedure for 
every
+        gconv-modules-extra.conf file that is available on your system.</p>
+     
+        <p>Additionally it is also good practice for applications to accept 
only
+        specific charsets, with an allow-list.</p>
+     
+        <p>Some Linux distributions such as <a href="GLIBC Vulnerability on
+        Servers Serving PHP">Debian</a>, CentOS, and others, already have
+        published patched variants of glibc. Please upgrade as soon as
+        possible.</p>
+     
+        <p>Once an update is available in glibc, updating that package on your
+        Linux machine will be enough to alleviate the issue. You do not need to
+        update PHP, as glibc is a dynamically linked library.</p>
+     
+        <p>PHP users on Windows are not affected.</p>
+     
+        <p>There will therefore also not be a new version of PHP for this
+        vulnerability.</p>
+    </div>
+  </content>
+</entry>

Reply via email to