Author: Gina Peter Banyard (Girgias)
Date: 2024-04-24T22:34:52+01:00

Commit: 
https://github.com/php/web-php/commit/9d503856dcee89a581f3163285dc4f8f27671b33
Raw diff: 
https://github.com/php/web-php/commit/9d503856dcee89a581f3163285dc4f8f27671b33.diff

Add missing words + markup again

Changed paths:
  M  archive/entries/2024-04-24-1.xml


Diff:

diff --git a/archive/entries/2024-04-24-1.xml b/archive/entries/2024-04-24-1.xml
index a378b76602..94ec2e1dc8 100644
--- a/archive/entries/2024-04-24-1.xml
+++ b/archive/entries/2024-04-24-1.xml
@@ -11,8 +11,9 @@
     <div xmlns="http://www.w3.org/1999/xhtml";>
         <p>Recently, a bug in <strong>glibc</strong> version 2.39 and older (<a
         
href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961";>CVE-2024-2961</a>) was 
uncovered
-        where a buffer overflow in character set conversions *to* the
-        ISO-2022-CN-EXT character set.</p>
+        where a buffer overflow in character set conversions 
<strong>to</strong>
+        the ISO-2022-CN-EXT character set can result in remote code execution.
+        </p>
 
         <p>This specific buffer overflow in glibc is exploitable through PHP,
         which uses the iconv functionality in glibc to do character set
@@ -22,7 +23,7 @@
 
         <p>There are numerous reports online with titles like "Mitigating the
         iconv Vulnerability for PHP (CVE-2024-2961)" or "PHP Under Attack". 
These
-        titles are misleading as this is <em>not</em> a bug in PHP itself.</p>
+        titles are misleading as this is <strong>not</strong> a bug in PHP 
itself.</p>
 
         <p>Currently there is no fix for this issue, but there is a workaround
         described in <a

Reply via email to