What's new

News New 28 year old Php/gnu c buffer overflow vulnerability.

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Note that PHP is only a mean to exploit the issue, the core of the issue is in glibc itself. But I guess since nobody knows what glibc but a lot of people have heard of PHP, it got publicized that way...

That same PHP would probably be safe if your platform used musl.
 
Note that PHP is only a mean to exploit the issue, the core of the issue is in glibc itself. But I guess since nobody knows what glibc but a lot of people have heard of PHP, it got publicized that way...

That same PHP would probably be safe if your platform used musl.

Yeah - this is one of those classic stack-smashing things, and it's not just on glibc or php... it's a common risk.

It could happen on a device that uses MUSL if the binaries statically link to a glibc, libc, or uclibc that doesn't have protection there...

 

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top