Event JSON
{
"id": "4897124e17edd550a577ba7f7263ee5557bbc91813b46856df31d4259cbbe6a2",
"pubkey": "7135da6bafcbe762209fd9e71be66df2b1c9ed04edba26c899fb167c9170ed59",
"created_at": 1713735762,
"kind": 1,
"tags": [
[
"t",
"iconv"
],
[
"t",
"glibc"
],
[
"t",
"php"
],
[
"proxy",
"https://hachyderm.io/users/j3j5/statuses/112311386903090357",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://hachyderm.io/users/j3j5/statuses/112311386903090357",
"pink.momostr"
]
],
"content": "tl;dr: upgrade glibc on your servers!\n\nSumming it up, there's a vulnerability (CVE-2024-2961) on glibc that, apparently, can be used to get RCE on servers running PHP.\nIt's recommended that you update glibc to a patched version.\n\nhttps://security-tracker.debian.org/tracker/CVE-2024-2961\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-2961\n\nThere's an upcoming talk on May 10 where the researcher will explain how it was used to hack PHP servers. \n\nhttps://www.offensivecon.org/speakers/2024/charles-fol.html\n\n#PHP #glibc #iconv",
"sig": "26617b5eec3364e1ceb248d9dd6e5725cb51da624076d432775aaea846037c2be3553434d3dddbe11e3d9e55237dcec1f26fd27cd4e42b41d9ef67f4d0af99f4"
}