Author: Derick Rethans (derickr)
Date: 2024-04-24T13:44:25-05:00
Commit:
https://github.com/php/web-php/commit/68279fb1e6a199cbf01cde47aad44562ff9af5f0
Raw diff:
https://github.com/php/web-php/commit/68279fb1e6a199cbf01cde47aad44562ff9af5f0.diff
Added statement on glibc vulnerability
Changed paths:
A archive/entries/2024-04-24-1.xml
M archive/archive.xml
Diff:
diff --git a/archive/archive.xml b/archive/archive.xml
index d5769aeaf7..f722736290 100644
--- a/archive/archive.xml
+++ b/archive/archive.xml
@@ -9,6 +9,7 @@
<uri>http://php.net/contact</uri>
<email>[email protected]</email>
</author>
+ <xi:include href="entries/2024-04-24-1.xml"/>
<xi:include href="entries/2024-04-11-3.xml"/>
<xi:include href="entries/2024-04-11-2.xml"/>
<xi:include href="entries/2024-04-11-1.xml"/>
diff --git a/archive/entries/2024-04-24-1.xml b/archive/entries/2024-04-24-1.xml
new file mode 100644
index 0000000000..1bdbe9e429
--- /dev/null
+++ b/archive/entries/2024-04-24-1.xml
@@ -0,0 +1,52 @@
+<?xml version="1.0" encoding="utf-8"?>
+<entry xmlns="http://www.w3.org/2005/Atom">
+ <title>Statement on glibc/iconv Vulnerability</title>
+ <id>https://www.php.net/archive/2024.php#2024-04-24-1</id>
+ <published>2024-04-24T18:40:29+00:00</published>
+ <updated>2024-04-24T18:40:29+00:00</updated>
+ <link href="https://www.php.net/index.php#2024-04-24-1" rel="alternate"
type="text/html"/>
+ <link href="https://www.php.net/archive/2024.php#2024-04-24-1" rel="via"
type="text/html"/>
+ <category term="frontpage" label="PHP.net frontpage news"/>
+ <content type="xhtml">
+ <div xmlns="http://www.w3.org/1999/xhtml">
+ <p>Recently, a bug in <b>glibc</b> version 2.39 and older (<a
+ href="archive/entries/2024-04-24-1.xml">CVE-2024-2961</a>) was
uncovered
+ where a buffer overflow in character set conversions *to* the
+ ISO-2022-CN-EXT character set.</p>
+
+ <p>This specific buffer overflow in glibc is exploitable through PHP,
+ which uses the iconv functionality in glibc to do character set
+ conversions. Although the bug is exploitable in the context of the PHP
+ Engine, the bug is not in PHP. It is also not directly exploitable
+ remotely.</p>
+
+ <p>There are numerous reports online with titles like "Mitigating the
+ iconv Vulnerability for PHP (CVE-2024-2961)" or "PHP Under Attack".
These
+ titles are misleading as this is *not* a bug in PHP itself.</p>
+
+ <p>Currently there is no fix for this issue, but there is a workaround
+ described in <a
+
href="https://rockylinux.org/news/glibc-vulnerability-april-2024/">GLIBC
+ Vulnerability on Servers Serving PHP</a>. It explains a way how to
remove
+ the problematic character set from glibc. Perform this procedure for
every
+ gconv-modules-extra.conf file that is available on your system.</p>
+
+ <p>Additionally it is also good practice for applications to accept
only
+ specific charsets, with an allow-list.</p>
+
+ <p>Some Linux distributions such as <a href="GLIBC Vulnerability on
+ Servers Serving PHP">Debian</a>, CentOS, and others, already have
+ published patched variants of glibc. Please upgrade as soon as
+ possible.</p>
+
+ <p>Once an update is available in glibc, updating that package on your
+ Linux machine will be enough to alleviate the issue. You do not need to
+ update PHP, as glibc is a dynamically linked library.</p>
+
+ <p>PHP users on Windows are not affected.</p>
+
+ <p>There will therefore also not be a new version of PHP for this
+ vulnerability.</p>
+ </div>
+ </content>
+</entry>