File tree 1 file changed +4
-3
lines changed 1 file changed +4
-3
lines changed Original file line number Diff line number Diff line change 11
11
<div xmlns =" http://www.w3.org/1999/xhtml" >
12
12
<p >Recently, a bug in <strong >glibc</strong > version 2.39 and older (<a
13
13
href =" https://nvd.nist.gov/vuln/detail/CVE-2024-2961" >CVE-2024-2961</a >) was uncovered
14
- where a buffer overflow in character set conversions *to* the
15
- ISO-2022-CN-EXT character set.</p >
14
+ where a buffer overflow in character set conversions <strong >to</strong >
15
+ the ISO-2022-CN-EXT character set can result in remote code execution.
16
+ </p >
16
17
17
18
<p >This specific buffer overflow in glibc is exploitable through PHP,
18
19
which uses the iconv functionality in glibc to do character set
22
23
23
24
<p >There are numerous reports online with titles like "Mitigating the
24
25
iconv Vulnerability for PHP (CVE-2024-2961)" or "PHP Under Attack". These
25
- titles are misleading as this is <em >not</em > a bug in PHP itself.</p >
26
+ titles are misleading as this is <strong >not</strong > a bug in PHP itself.</p >
26
27
27
28
<p >Currently there is no fix for this issue, but there is a workaround
28
29
described in <a
You can’t perform that action at this time.
0 commit comments