<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Aftermath: people, running Debian httpd 2.4.66, started complaining when they’ll get the 2.4.67 update to fix this RCE vulnerability.]]></title><description><![CDATA[<p class="quote-inline">RE: <a href="https://chaos.social/@icing/116526903529846107" rel="nofollow noopener"><span>https://</span><span>chaos.social/@icing/1165269035</span><span>29846107</span></a></p><blockquote><p>Aftermath: people, running Debian httpd 2.4.66, started complaining when they’ll get the 2.4.67 update to fix this RCE vulnerability. Which they already were protected from, but did not know. <em>Because the CVE was not public at the time the fix was shipped.</em></p></blockquote><p>[...]</p><blockquote><p>Two security researchers found the vulnerability independently. Just scanning the 2.4.66 source code. This means <em>the bad guys</em> can no longer be <em>kept in the dark</em>. <strong>Coordinated disclosure no longer works.</strong></p></blockquote><p><a href="https://infosec.exchange/tags/CVE_2026_23918" rel="tag">#<span>CVE_2026_23918</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/b388331e-a1bb-4aa5-a036-7f10dd2d650e/aftermath-people-running-debian-httpd-2.4.66-started-complaining-when-they-ll-get-the-2.4.67-update-to-fix-this-rce-vulnerability.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 04:57:19 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/b388331e-a1bb-4aa5-a036-7f10dd2d650e.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 06 May 2026 12:08:04 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Aftermath: people, running Debian httpd 2.4.66, started complaining when they’ll get the 2.4.67 update to fix this RCE vulnerability. on Wed, 06 May 2026 14:48:04 GMT]]></title><description><![CDATA[<p><span><a href="/user/davemwilburn%40infosec.exchange">@<span>DaveMWilburn</span></a></span> Not disagreeing - I think Eissing is using "responsible" here on purpose, rather than "coordinated"</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/tychotithonus/statuses/116528177784135672</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/tychotithonus/statuses/116528177784135672</guid><dc:creator><![CDATA[tychotithonus@infosec.exchange]]></dc:creator><pubDate>Wed, 06 May 2026 14:48:04 GMT</pubDate></item><item><title><![CDATA[Reply to Aftermath: people, running Debian httpd 2.4.66, started complaining when they’ll get the 2.4.67 update to fix this RCE vulnerability. on Wed, 06 May 2026 13:41:48 GMT]]></title><description><![CDATA[<p><span><a href="/user/tychotithonus%40infosec.exchange">@<span>tychotithonus</span></a></span> </p><p>Eh... This isn't a particularly new issue. Doesn't even require source code, either. Bindiff is a couple decades old at this point.</p><p>Just because coordinated disclosure is hard and messy and flawed doesn't mean we should give up on the idea of protecting downstream users like the jerks behind the copy.fail disclosure did.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/DaveMWilburn/statuses/116527917226014318</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/DaveMWilburn/statuses/116527917226014318</guid><dc:creator><![CDATA[davemwilburn@infosec.exchange]]></dc:creator><pubDate>Wed, 06 May 2026 13:41:48 GMT</pubDate></item></channel></rss>