Skip to content

Commit 44532fe

Browse files
committed
Fix link and HTML markup
1 parent f9e5c80 commit 44532fe

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

archive/entries/2024-04-24-1.xml

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,42 +9,42 @@
99
<category term="frontpage" label="PHP.net frontpage news"/>
1010
<content type="xhtml">
1111
<div xmlns="http://www.w3.org/1999/xhtml">
12-
<p>Recently, a bug in <b>glibc</b> version 2.39 and older (<a
13-
href="archive/entries/2024-04-24-1.xml">CVE-2024-2961</a>) was uncovered
12+
<p>Recently, a bug in <strong>glibc</strong> version 2.39 and older (<a
13+
href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961</a>) was uncovered
1414
where a buffer overflow in character set conversions *to* the
1515
ISO-2022-CN-EXT character set.</p>
16-
16+
1717
<p>This specific buffer overflow in glibc is exploitable through PHP,
1818
which uses the iconv functionality in glibc to do character set
1919
conversions. Although the bug is exploitable in the context of the PHP
2020
Engine, the bug is not in PHP. It is also not directly exploitable
2121
remotely.</p>
22-
22+
2323
<p>There are numerous reports online with titles like "Mitigating the
2424
iconv Vulnerability for PHP (CVE-2024-2961)" or "PHP Under Attack". These
25-
titles are misleading as this is *not* a bug in PHP itself.</p>
26-
25+
titles are misleading as this is <em>not</em> a bug in PHP itself.</p>
26+
2727
<p>Currently there is no fix for this issue, but there is a workaround
2828
described in <a
2929
href="https://rockylinux.org/news/glibc-vulnerability-april-2024/">GLIBC
3030
Vulnerability on Servers Serving PHP</a>. It explains a way how to remove
3131
the problematic character set from glibc. Perform this procedure for every
3232
gconv-modules-extra.conf file that is available on your system.</p>
33-
33+
3434
<p>Additionally it is also good practice for applications to accept only
3535
specific charsets, with an allow-list.</p>
36-
36+
3737
<p>Some Linux distributions such as <a
3838
href="https://security-tracker.debian.org/tracker/CVE-2024-2961">Debian</a>,
3939
CentOS, and others, already have published patched variants of glibc.
4040
Please upgrade as soon as possible.</p>
41-
41+
4242
<p>Once an update is available in glibc, updating that package on your
4343
Linux machine will be enough to alleviate the issue. You do not need to
4444
update PHP, as glibc is a dynamically linked library.</p>
45-
45+
4646
<p>PHP users on Windows are not affected.</p>
47-
47+
4848
<p>There will therefore also not be a new version of PHP for this
4949
vulnerability.</p>
5050
</div>

0 commit comments

Comments
 (0)