j3j5, 26 days ago to php tl;dr: upgrade glibc on your servers! Summing it up, there's a vulnerability (CVE-2024-2961) on glibc that, apparently, can be used to get RCE on servers running PHP. It's recommended that you update glibc to a patched version. https://security-tracker.debian.org/tracker/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-2961 There's an upcoming talk on May 10 where the researcher will explain how it was used to hack PHP servers. https://www.offensivecon.org/speakers/2024/charles-fol.html #PHP #glibc #iconv
tl;dr: upgrade glibc on your servers!
Summing it up, there's a vulnerability (CVE-2024-2961) on glibc that, apparently, can be used to get RCE on servers running PHP. It's recommended that you update glibc to a patched version.
https://security-tracker.debian.org/tracker/CVE-2024-2961 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-2961
There's an upcoming talk on May 10 where the researcher will explain how it was used to hack PHP servers.
https://www.offensivecon.org/speakers/2024/charles-fol.html
#PHP #glibc #iconv
slink, 8 months ago to random Another week, another new #vmod for #varnishcache Today: #iconv character encoding conversions for #vcl https://gitlab.com/uplex/varnish/libvmod-iconv
Another week, another new #vmod for #varnishcache
Today: #iconv character encoding conversions for #vcl
https://gitlab.com/uplex/varnish/libvmod-iconv