Author: Peter Kokot (petk)
Committer: GitHub (web-flow)
Pusher: Girgias
Date: 2024-04-24T21:39:29+01:00

Commit: 
https://github.com/php/web-php/commit/f9e5c80955f64930b19bf48fb46ece909a903824
Raw diff: 
https://github.com/php/web-php/commit/f9e5c80955f64930b19bf48fb46ece909a903824.diff

Add URL to Debian security tracker (#982)

Changed paths:
  M  archive/entries/2024-04-24-1.xml


Diff:

diff --git a/archive/entries/2024-04-24-1.xml b/archive/entries/2024-04-24-1.xml
index 1bdbe9e429..62f4fed063 100644
--- a/archive/entries/2024-04-24-1.xml
+++ b/archive/entries/2024-04-24-1.xml
@@ -34,10 +34,10 @@
         <p>Additionally it is also good practice for applications to accept 
only
         specific charsets, with an allow-list.</p>
      
-        <p>Some Linux distributions such as <a href="GLIBC Vulnerability on
-        Servers Serving PHP">Debian</a>, CentOS, and others, already have
-        published patched variants of glibc. Please upgrade as soon as
-        possible.</p>
+        <p>Some Linux distributions such as <a
+        
href="https://security-tracker.debian.org/tracker/CVE-2024-2961";>Debian</a>,
+        CentOS, and others, already have published patched variants of glibc.
+        Please upgrade as soon as possible.</p>
      
         <p>Once an update is available in glibc, updating that package on your
         Linux machine will be enough to alleviate the issue. You do not need to

Reply via email to