Author: Peter Kokot (petk) Committer: GitHub (web-flow) Pusher: Girgias Date: 2024-04-24T21:39:29+01:00
Commit: https://github.com/php/web-php/commit/f9e5c80955f64930b19bf48fb46ece909a903824 Raw diff: https://github.com/php/web-php/commit/f9e5c80955f64930b19bf48fb46ece909a903824.diff Add URL to Debian security tracker (#982) Changed paths: M archive/entries/2024-04-24-1.xml Diff: diff --git a/archive/entries/2024-04-24-1.xml b/archive/entries/2024-04-24-1.xml index 1bdbe9e429..62f4fed063 100644 --- a/archive/entries/2024-04-24-1.xml +++ b/archive/entries/2024-04-24-1.xml @@ -34,10 +34,10 @@ <p>Additionally it is also good practice for applications to accept only specific charsets, with an allow-list.</p> - <p>Some Linux distributions such as <a href="GLIBC Vulnerability on - Servers Serving PHP">Debian</a>, CentOS, and others, already have - published patched variants of glibc. Please upgrade as soon as - possible.</p> + <p>Some Linux distributions such as <a + href="https://security-tracker.debian.org/tracker/CVE-2024-2961">Debian</a>, + CentOS, and others, already have published patched variants of glibc. + Please upgrade as soon as possible.</p> <p>Once an update is available in glibc, updating that package on your Linux machine will be enough to alleviate the issue. You do not need to