unofficial mirror of bug-guix@gnu.org 
 help / color / mirror / code / Atom feed
* bug#70581: PHP, glibc, and CVE-2024-2961
@ 2024-04-26  6:44 McSinyx via Bug reports for GNU Guix
  2024-04-26  7:20 ` Liliana Marie Prikler
  2024-12-14 14:20 ` bug#70581: [PATCH] gnu: glibc: Graft with fix for CVE-2024-2961 Maxim Cournoyer
  0 siblings, 2 replies; 5+ messages in thread
From: McSinyx via Bug reports for GNU Guix @ 2024-04-26  6:44 UTC (permalink / raw)
  To: 70581

Hello Guix,

Last week, an overflow bug in glibc's iconv(3) was discovered:
https://www.openwall.com/lists/oss-security/2024/04/17/9

It may enable remove code execution through PHP.  Due to
the immutable nature of Guix, is it possible to hotpatch
this using graft, or do we need to rebuild to world?
https://rockylinux.org/news/glibc-vulnerability-april-2024/

Kind regards,
McSinyx




^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2024-12-18 10:09 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-04-26  6:44 bug#70581: PHP, glibc, and CVE-2024-2961 McSinyx via Bug reports for GNU Guix
2024-04-26  7:20 ` Liliana Marie Prikler
2024-12-14 14:20 ` bug#70581: [PATCH] gnu: glibc: Graft with fix for CVE-2024-2961 Maxim Cournoyer
2024-12-18  7:31   ` bug#70581: PHP, glibc, and CVE-2024-2961 Maxim Cournoyer
2024-12-18 10:07   ` Ludovic Courtès

Code repositories for project(s) associated with this public inbox

	https://git.savannah.gnu.org/cgit/guix.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).